Movatterモバイル変換


[0]ホーム

URL:


US8850050B1 - Providing a managed browser - Google Patents

Providing a managed browser
Download PDF

Info

Publication number
US8850050B1
US8850050B1US14/043,343US201314043343AUS8850050B1US 8850050 B1US8850050 B1US 8850050B1US 201314043343 AUS201314043343 AUS 201314043343AUS 8850050 B1US8850050 B1US 8850050B1
Authority
US
United States
Prior art keywords
computing device
managed
policies
managed browser
browser
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US14/043,343
Other versions
US20140297862A1 (en
Inventor
Waheed Qureshi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Citrix Systems Inc
Original Assignee
Citrix Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Citrix Systems IncfiledCriticalCitrix Systems Inc
Priority to US14/043,343priorityCriticalpatent/US8850050B1/en
Assigned to CITRIX SYSTEMS, INC.reassignmentCITRIX SYSTEMS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: QURESHI, WAHEED
Application grantedgrantedCritical
Publication of US8850050B1publicationCriticalpatent/US8850050B1/en
Publication of US20140297862A1publicationCriticalpatent/US20140297862A1/en
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATIONreassignmentWILMINGTON TRUST, NATIONAL ASSOCIATIONSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CITRIX SYSTEMS, INC.
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTreassignmentWILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTPATENT SECURITY AGREEMENTAssignors: CITRIX SYSTEMS, INC., TIBCO SOFTWARE INC.
Assigned to GOLDMAN SACHS BANK USA, AS COLLATERAL AGENTreassignmentGOLDMAN SACHS BANK USA, AS COLLATERAL AGENTSECOND LIEN PATENT SECURITY AGREEMENTAssignors: CITRIX SYSTEMS, INC., TIBCO SOFTWARE INC.
Assigned to BANK OF AMERICA, N.A., AS COLLATERAL AGENTreassignmentBANK OF AMERICA, N.A., AS COLLATERAL AGENTPATENT SECURITY AGREEMENTAssignors: CITRIX SYSTEMS, INC., TIBCO SOFTWARE INC.
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTreassignmentWILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTPATENT SECURITY AGREEMENTAssignors: CITRIX SYSTEMS, INC., CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.)
Assigned to CITRIX SYSTEMS, INC., CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.)reassignmentCITRIX SYSTEMS, INC.RELEASE AND REASSIGNMENT OF SECURITY INTEREST IN PATENT (REEL/FRAME 062113/0001)Assignors: GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTreassignmentWILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CITRIX SYSTEMS, INC., CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.)
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTreassignmentWILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTPATENT SECURITY AGREEMENTAssignors: CITRIX SYSTEMS, INC., CLOUD SOFTWARE GROUP, INC.
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods, systems, computer-readable media, and apparatuses for providing a managed browser are presented. In various embodiments, a computing device may load a managed browser. The managed browser may, for instance, be configured to provide a managed mode in which one or more policies are applied to the managed browser, and an unmanaged mode in which such policies might not be applied and/or in which the browser might not be managed by at least one device manager agent running on the computing device. Based on device state information and/or one or more policies, the managed browser may switch between the managed mode and the unmanaged mode, and the managed browser may provide various functionalities, which may include selectively providing access to enterprise resources, based on such state information and/or the one or more policies.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a continuation of U.S. patent application Ser. No. 14/040,831, filed Sep. 30, 2013, and entitled “PROVIDING A MANAGED BROWSER,” and which is incorporated by reference herein in its entirety. In addition, this application claims the benefit of U.S. Provisional Patent Application Ser. No. 61/866,229, filed Aug. 15, 2013, and entitled “PROVIDING A SECURE BROWSER,” and which is incorporated by reference herein in its entirety. This application also claims the benefit of U.S. Provisional Patent Application Ser. No. 61/806,577, filed Mar. 29, 2013, and entitled “SYSTEMS AND METHODS FOR ENTERPRISE MOBILITY MANAGEMENT,” and which is incorporated by reference herein in its entirety.
BACKGROUND
Aspects of the disclosure relate to computer hardware and software. In particular, one or more aspects of the disclosure generally relate to computer hardware and software for providing a managed browser.
Increasingly, corporations and other organizations are providing and/or otherwise enabling their employees and other associates with mobile devices, such as smart phones, tablet computers, and other mobile computing devices. As these devices continue to grow in popularity and provide an increasing number of functions, many organizations may wish to place certain controls on how these devices can be used, what resources these devices can access, and how the applications running on these devices can interact with other resources.
SUMMARY
Various aspects of the disclosure provide more efficient, effective, functional, and convenient ways of controlling how mobile devices can be used, what resources mobile devices can access, and how the applications and other software running on these devices can interact with other resources. In particular, in one or more embodiments discussed in greater detail below, a managed browser can be deployed, implemented, and/or used in a number of different ways to provide one or more of these and/or other advantages.
In some embodiments, a computing device may load a managed browser. Subsequently, the computing device may receive a request to access one or more enterprise resources via the managed browser. Then, the computing device may create at least one application tunnel from the managed browser to the one or more enterprise resources. The computing device then may obtain enterprise data from the one or more enterprise resources via the at least one application tunnel.
In some embodiments, a computing device may load a managed browser. Subsequently, the computing device may establish a connection to at least one other computing device to initiate a device cloud. Then, the computing device may extend a session of the managed browser across the device cloud.
In some embodiments, a computing device may load a managed browser. Subsequently, the computing device may obtain device state information. Then, the computing device may determine, based on the device state information, whether to selectively disable one or more operational modes of the managed browser. In response to determining to selectively disable at least one operational mode of the managed browser, the computing device may cause the at least one operational mode to be disabled.
In some embodiments, a computing device may load a managed browser. Subsequently, the computing device may receive one or more policies. Then, the computing device may apply the one or more policies to the managed browser.
In some embodiments, a computing device may load a managed browser. Subsequently, the computing device may receive a request to access one or more enterprise resources via the managed browser. Then, the computing device may obtain enterprise data from the one or more enterprise resources based on the request. The computing device then may store the obtained enterprise data in a secure document container.
In some embodiments, a computing device may load a managed browser. Subsequently, the computing device may receive a single sign-on (SSO) credential that is associated with at least one user account. Then, the computing device may obtain enterprise data from one or more enterprise resources based on the SSO credential. The computing device then may provide access to the obtained enterprise data via the managed browser.
In some embodiments, a computing device may load a managed browser. Subsequently, the computing device may receive a request to access an application store via the managed browser. Then, the computing device may obtain enterprise data from the application store based on the request.
In some embodiments, a computing device may load a managed browser. Subsequently, the computing device may receive a request to access one or more enterprise resources via the managed browser. Then, the computing device may obtain enterprise data from the one or more enterprise resources based on the request. The computing device then may control the obtained enterprise data based on one or more policies.
These features, along with many others, are discussed in greater detail below.
BRIEF DESCRIPTION OF THE DRAWINGS
The present disclosure is illustrated by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements and in which:
FIG. 1 depicts an illustrative computer system architecture that may be used in accordance with one or more illustrative aspects described herein.
FIG. 2 depicts an illustrative remote-access system architecture that may be used in accordance with one or more illustrative aspects described herein.
FIG. 3 depicts an illustrative enterprise mobility management system that may be used in accordance with one or more illustrative aspects described herein.
FIG. 4 depicts another illustrative enterprise mobility management system that may be used in accordance with one or more illustrative aspects described herein.
FIG. 5 depicts a flowchart that illustrates a method of creating an application tunnel from a managed browser to one or more enterprise resources in accordance with one or more illustrative aspects discussed herein.
FIG. 6 depicts a flowchart that illustrates a method of extending a managed browser session across a device cloud in accordance with one or more illustrative aspects discussed herein.
FIG. 7 depicts a flowchart that illustrates a method of selectively disabling an operational mode of a managed browser in accordance with one or more illustrative aspects discussed herein.
FIG. 8 depicts a flowchart that illustrates a method of applying one or more mobile device management policies to a managed browser in accordance with one or more illustrative aspects discussed herein.
FIG. 9 depicts a flowchart that illustrates a method of providing access to a secure document container via a managed browser in accordance with one or more illustrative aspects discussed herein.
FIG. 10 depicts a flowchart that illustrates a method of obtaining enterprise data based on a single sign-on credential and providing access to the data via a managed browser in accordance with one or more illustrative aspects discussed herein.
FIG. 11 depicts a flowchart that illustrates a method of providing access to an application store via a managed browser in accordance with one or more illustrative aspects discussed herein.
FIG. 12 depicts a flowchart that illustrates a method of obtaining and controlling enterprise data with a managed browser in accordance with one or more illustrative aspects discussed herein.
FIG. 13 depicts a flowchart that illustrates a method of administering one or more policies for a managed browser in accordance with one or more illustrative aspects discussed herein.
FIG. 14 depicts a flowchart that illustrates another method of providing access to an application store via a managed browser in accordance with one or more illustrative aspects discussed herein.
FIG. 15 depicts a flowchart that illustrates a method of providing a managed execution environment within a managed browser in accordance with one or more illustrative aspects discussed herein.
DETAILED DESCRIPTION
In the following description of the various embodiments, reference is made to the accompanying drawings identified above, which form a part hereof, and in which is shown by way of illustration various embodiments in which various aspects of the disclosure may be practiced. Other embodiments may be utilized, and structural and functional modifications may be made, without departing from the scope discussed herein. Various aspects are capable of other embodiments and of being practiced or being carried out in various different ways. In addition, the phraseology and terminology used herein are for the purpose of description and should not be regarded as limiting. Rather, the phrases and terms used herein are to be given their broadest interpretation and meaning. The use of “including” and “comprising” and variations thereof is meant to encompass the items listed thereafter and equivalents thereof as well as additional items and equivalents thereof.
As noted above, certain embodiments are discussed herein that relate to providing a managed browser. Before discussing these concepts in greater detail, however, several examples of computing architecture and enterprise mobility management architecture that may be used in implementing and/or otherwise providing various aspects of the disclosure will first be discussed with respect toFIGS. 1-4.
Computing Architecture
Computer software, hardware, and networks may be utilized in a variety of different system environments, including standalone, networked, remote-access (aka, remote desktop), virtualized, and/or cloud-based environments, among others.FIG. 1 illustrates one example of a system architecture and data processing device that may be used to implement one or more illustrative aspects described herein in a standalone and/or networked environment.Various network nodes103,105,107, and109 may be interconnected via a wide area network (WAN)101, such as the Internet. Other networks may also or alternatively be used, including private intranets, corporate networks, local area networks (LANs), metropolitan area networks (MAN), wireless networks, personal networks (PAN), and the like.Network101 is for illustration purposes and may be replaced with fewer or additional computer networks. A LAN may have one or more of any known LAN topology and may use one or more of a variety of different protocols, such as Ethernet.Devices103,105,107,109 and other devices (not shown) may be connected to one or more of the networks via twisted pair wires, coaxial cable, fiber optics, radio waves or other communication media.
The term “network” as used herein and depicted in the drawings refers not only to systems in which remote storage devices are coupled together via one or more communication paths, but also to stand-alone devices that may be coupled, from time to time, to such systems that have storage capability. Consequently, the term “network” includes not only a “physical network” but also a “content network,” which is comprised of the data—attributable to a single entity—which resides across all physical networks.
The components may includedata server103, web server105, andclient computers107,109.Data server103 provides overall access, control and administration of databases and control software for performing one or more illustrative aspects describe herein.Data server103 may be connected to web server105 through which users interact with and obtain data as requested. Alternatively,data server103 may act as a web server itself and be directly connected to the Internet.Data server103 may be connected to web server105 through the network101 (e.g., the Internet), via direct or indirect connection, or via some other network. Users may interact with thedata server103 usingremote computers107,109, e.g., using a web browser to connect to thedata server103 via one or more externally exposed web sites hosted by web server105.Client computers107,109 may be used in concert withdata server103 to access data stored therein, or may be used for other purposes. For example, from client device107 a user may access web server105 using an Internet browser, as is known in the art, or by executing a software application that communicates with web server105 and/ordata server103 over a computer network (such as the Internet).
Servers and applications may be combined on the same physical machines, and retain separate virtual or logical addresses, or may reside on separate physical machines.FIG. 1 illustrates just one example of a network architecture that may be used, and those of skill in the art will appreciate that the specific network architecture and data processing devices used may vary, and are secondary to the functionality that they provide, as further described herein. For example, services provided by web server105 anddata server103 may be combined on a single server.
Eachcomponent103,105,107,109 may be any type of known computer, server, or data processing device.Data server103, e.g., may include aprocessor111 controlling overall operation of therate server103.Data server103 may further includeRAM113,ROM115,network interface117, input/output interfaces119 (e.g., keyboard, mouse, display, printer, etc.), andmemory121. I/O119 may include a variety of interface units and drives for reading, writing, displaying, and/or printing data or files.Memory121 may further store operating system software123 for controlling overall operation of thedata processing device103,control logic125 for instructingdata server103 to perform aspects described herein, andother application software127 providing secondary, support, and/or other functionality which may or may not be used in conjunction with aspects described herein. The control logic may also be referred to herein as thedata server software125. Functionality of the data server software may refer to operations or decisions made automatically based on rules coded into the control logic, made manually by a user providing input into the system, and/or a combination of automatic processing based on user input (e.g., queries, data updates, etc.).
Memory121 may also store data used in performance of one or more aspects described herein, including a first database129 and asecond database131. In some embodiments, the first database may include the second database (e.g., as a separate table, report, etc.). That is, the information can be stored in a single database, or separated into different logical, virtual, or physical databases, depending on system design.Devices105,107,109 may have similar or different architecture as described with respect todevice103. Those of skill in the art will appreciate that the functionality of data processing device103 (ordevice105,107,109) as described herein may be spread across multiple data processing devices, for example, to distribute processing load across multiple computers, to segregate transactions based on geographic location, user access level, quality of service (QoS), etc.
One or more aspects may be embodied in computer-usable or readable data and/or computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices as described herein. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The modules may be written in a source code programming language that is subsequently compiled for execution, or may be written in a scripting language such as (but not limited to) Javascript or ActionScript. The computer executable instructions may be stored on a computer readable medium such as a nonvolatile storage device. Any suitable computer readable storage media may be utilized, including hard disks, CD-ROMs, optical storage devices, magnetic storage devices, and/or any combination thereof. In addition, various transmission (non-storage) media representing data or events as described herein may be transferred between a source and a destination in the form of electromagnetic waves traveling through signal-conducting media such as metal wires, optical fibers, and/or wireless transmission media (e.g., air and/or space). Various aspects described herein may be embodied as a method, a data processing system, or a computer program product. Therefore, various functionalities may be embodied in whole or in part in software, firmware and/or hardware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA), and the like. Particular data structures may be used to more effectively implement one or more aspects described herein, and such data structures are contemplated within the scope of computer executable instructions and computer-usable data described herein.
With further reference toFIG. 2, one or more aspects described herein may be implemented in a remote-access environment.FIG. 2 depicts an example system architecture including ageneric computing device201 in anillustrative computing environment200 that may be used according to one or more illustrative aspects described herein.Generic computing device201 may be used as a server206ain a single-server or multi-server desktop virtualization system (e.g., a remote access or cloud system) configured to provide virtual machines for client access devices. Thegeneric computing device201 may have aprocessor203 for controlling overall operation of the server and its associated components, including random access memory (RAM)205, read-only memory (ROM)207, input/output (I/O)module209, andmemory215.
I/O module209 may include a mouse, keypad, touch screen, scanner, optical reader, and/or stylus (or other input device(s)) through which a user ofgeneric computing device201 may provide input, and may also include one or more of a speaker for providing audio output and a video display device for providing textual, audiovisual, and/or graphical output. Software may be stored withinmemory215 and/or other storage to provide instructions toprocessor203 for configuringgeneric computing device201 into a special purpose computing device in order to perform various functions as described herein. For example,memory215 may store software used by thecomputing device201, such as anoperating system217,application programs219, and an associateddatabase221.
Computing device201 may operate in a networked environment supporting connections to one or more remote computers, such as terminals240 (also referred to as client devices). Theterminals240 may be personal computers, mobile devices, laptop computers, tablets, or servers that include many or all of the elements described above with respect to thegeneric computing device103 or201. The network connections depicted inFIG. 2 include a local area network (LAN)225 and a wide area network (WAN)229, but may also include other networks. When used in a LAN networking environment,computing device201 may be connected to theLAN225 through a network interface oradapter223. When used in a WAN networking environment,computing device201 may include amodem227 or other wide area network interface for establishing communications over theWAN229, such as computer network230 (e.g., the Internet). It will be appreciated that the network connections shown are illustrative and other means of establishing a communications link between the computers may be used.Computing device201 and/orterminals240 may also be mobile terminals (e.g., mobile phones, smartphones, PDAs, notebooks, etc.) including various other components, such as a battery, speaker, and antennas (not shown).
Aspects described herein may also be operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of other computing systems, environments, and/or configurations that may be suitable for use with aspects described herein include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
As shown inFIG. 2, one ormore client devices240 may be in communication with one ormore servers206a-206n(generally referred to herein as “server(s)206”). In one embodiment, thecomputing environment200 may include a network appliance installed between the server(s)206 and client machine(s)240. The network appliance may manage client/server connections, and in some cases can load balance client connections amongst a plurality ofbackend servers206.
The client machine(s)240 may in some embodiments be referred to as asingle client machine240 or a single group ofclient machines240, while server(s)206 may be referred to as asingle server206 or a single group ofservers206. In one embodiment asingle client machine240 communicates with more than oneserver206, while in another embodiment asingle server206 communicates with more than oneclient machine240. In yet another embodiment, asingle client machine240 communicates with asingle server206.
Aclient machine240 can, in some embodiments, be referenced by any one of the following non-exhaustive terms: client machine(s); client(s); client computer(s); client device(s); client computing device(s); local machine; remote machine; client node(s); endpoint(s); or endpoint node(s). Theserver206, in some embodiments, may be referenced by any one of the following non-exhaustive terms: server(s), local machine; remote machine; server farm(s), or host computing device(s).
In one embodiment, theclient machine240 may be a virtual machine. The virtual machine may be any virtual machine, while in some embodiments the virtual machine may be any virtual machine managed by aType 1 orType 2 hypervisor, for example, a hypervisor developed by Citrix Systems, IBM, VMware, or any other hypervisor. In some aspects, the virtual machine may be managed by a hypervisor, while in aspects the virtual machine may be managed by a hypervisor executing on aserver206 or a hypervisor executing on aclient240.
Some embodiments include aclient device240 that displays application output generated by an application remotely executing on aserver206 or other remotely located machine. In these embodiments, theclient device240 may execute a virtual machine client agent program or application to display the output in an application window, a browser, or other output window. In one example, the application is a desktop, while in other examples the application is an application that generates or presents a desktop. A desktop may include a graphical shell providing a user interface for an instance of an operating system in which local and/or remote applications can be integrated. Applications, as used herein, are programs that execute after an instance of an operating system (and, optionally, also the desktop) has been loaded.
Theserver206, in some embodiments, uses a remote presentation protocol or other program to send data to a thin-client or remote-display application executing on the client to present display output generated by an application executing on theserver206. The thin-client or remote-display protocol can be any one of the following non-exhaustive list of protocols: the Independent Computing Architecture (ICA) protocol developed by Citrix Systems, Inc. of Ft. Lauderdale, Fla.; or the Remote Desktop Protocol (RDP) manufactured by the Microsoft Corporation of Redmond, Wash.
A remote computing environment may include more than oneserver206a-206nsuch that theservers206a-206nare logically grouped together into aserver farm206, for example, in a cloud computing environment. Theserver farm206 may includeservers206 that are geographically dispersed while and logically grouped together, orservers206 that are located proximate to each other while logically grouped together. Geographically dispersedservers206a-206nwithin aserver farm206 can, in some embodiments, communicate using a WAN (wide), MAN (metropolitan), or LAN (local), where different geographic regions can be characterized as: different continents; different regions of a continent; different countries; different states; different cities; different campuses; different rooms; or any combination of the preceding geographical locations. In some embodiments theserver farm206 may be administered as a single entity, while in other embodiments theserver farm206 can include multiple server farms.
In some embodiments, a server farm may includeservers206 that execute a substantially similar type of operating system platform (e.g., WINDOWS, UNIX, LINUX, iOS, ANDROID, SYMBIAN, etc.) In other embodiments,server farm206 may include a first group of one or more servers that execute a first type of operating system platform, and a second group of one or more servers that execute a second type of operating system platform.
Server206 may be configured as any type of server, as needed, e.g., a file server, an application server, a web server, a proxy server, an appliance, a network appliance, a gateway, an application gateway, a gateway server, a virtualization server, a deployment server, a SSL VPN server, a firewall, a web server, an application server or as a master application server, a server executing an active directory, or a server executing an application acceleration program that provides firewall functionality, application functionality, or load balancing functionality. Other server types may also be used.
Some embodiments include a first server206athat receives requests from aclient machine240, forwards the request to a second server206b, and responds to the request generated by theclient machine240 with a response from the second server206b. First server206amay acquire an enumeration of applications available to theclient machine240 and well as address information associated with anapplication server206 hosting an application identified within the enumeration of applications. First server206acan then present a response to the client's request using a web interface, and communicate directly with theclient240 to provide theclient240 with access to an identified application. One ormore clients240 and/or one ormore servers206 may transmit data overnetwork230, e.g.,network101.
FIG. 2 shows a high-level architecture of an illustrative desktop virtualization system. As shown, the desktop virtualization system may be single-server or multi-server system, or cloud system, including at least onevirtualization server206 configured to provide virtual desktops and/or virtual applications to one or moreclient access devices240. As used herein, a desktop refers to a graphical environment or space in which one or more applications may be hosted and/or executed. A desktop may include a graphical shell providing a user interface for an instance of an operating system in which local and/or remote applications can be integrated. Applications may include programs that execute after an instance of an operating system (and, optionally, also the desktop) has been loaded. Each instance of the operating system may be physical (e.g., one operating system per device) or virtual (e.g., many instances of an OS running on a single device). Each application may be executed on a local device, or executed on a remotely located device (e.g., remoted).
Enterprise Mobility Management Architecture
FIG. 3 represents an enterprise mobilitytechnical architecture300 for use in an enterprise environment, a BYOD environment, or other mobile environments. The architecture enables a user of a mobile device302 (e.g., asclient107,211, or otherwise) to both access enterprise or personal resources from amobile device302 and use themobile device302 for personal use. The user may accesssuch enterprise resources304 orenterprise services308 using amobile device302 that is purchased by the user or amobile device302 that is provided by the enterprise to the user. The user may utilize themobile device302 for business use only or for business and personal use. The mobile device may run an iOS operating system, Android operating system, and/or the like. The enterprise may choose to implement policies to manage themobile device304. The policies may be implanted through a firewall or gateway in such a way that the mobile device may be identified, secured or security verified, and provided selective or full access to the enterprise resources. The policies may be mobile device management policies, mobile application management policies, mobile data management policies, or some combination of mobile device, application, and data management policies. Amobile device304 that is managed through the application of mobile device management policies may be referred to as an enrolled device.
The operating system of the mobile device may be separated into a managedpartition310 and an unmanaged partition312. The managedpartition310 may have policies applied to it to secure the applications running on and data stored in the managed partition. The applications running on the managed partition may be secure applications. The secure applications may be email applications, web browsing applications, software-as-a-service (SaaS) access applications, Windows Application access applications, and the like. The secure applications may be securenative applications314, secureremote applications322 executed by a secure application launcher318,virtualization applications326 executed by a secure application launcher318, and the like. The securenative applications314 may be wrapped by asecure application wrapper320. Thesecure application wrapper320 may include integrated policies that are executed on themobile device302 when the secure native application is executed on the device. Thesecure application wrapper320 may include meta-data that points the securenative application314 running on themobile device302 to the resources hosted at the enterprise that the securenative application314 may require to complete the task requested upon execution of the securenative application314. The secureremote applications322 executed by a secure application launcher318 may be executed within the secure application launcher application318. Thevirtualization applications326 executed by a secure application launcher318 may utilize resources on themobile device302, at theenterprise resources304, and the like. The resources used on themobile device302 by thevirtualization applications326 executed by a secure application launcher318 may include user interaction resources, processing resources, and the like. The user interaction resources may be used to collect and transmit keyboard input, mouse input, camera input, tactile input, audio input, visual input, gesture input, and the like. The processing resources may be used to present a user interface, process data received from theenterprise resources304, and the like. The resources used at theenterprise resources304 by thevirtualization applications326 executed by a secure application launcher318 may include user interface generation resources, processing resources, and the like. The user interface generation resources may be used to assemble a user interface, modify a user interface, refresh a user interface, and the like. The processing resources may be used to create information, read information, update information, delete information, and the like. For example, the virtualization application may record user interactions associated with a GUI and communicate them to a server application where the server application will use the user interaction data as an input to the application operating on the server. In this arrangement, an enterprise may elect to maintain the application on the server side as well as data, files, etc. associated with the application. While an enterprise may elect to “mobilize” some applications in accordance with the principles herein by securing them for deployment on the mobile device, this arrangement may also be elected for certain applications. For example, while some applications may be secured for use on the mobile device, others may not be prepared or appropriate for deployment on the mobile device so the enterprise may elect to provide the mobile user access to the unprepared applications through virtualization techniques. As another example, the enterprise may have large complex applications with large and complex data sets (e.g. material resource planning applications) where it would be very difficult, or otherwise undesirable, to customize the application for the mobile device so the enterprise may elect to provide access to the application through virtualization techniques. As yet another example, the enterprise may have an application that maintains highly secured data (e.g. human resources data, customer data, engineering data) that may be deemed by the enterprise as too sensitive for even the secured mobile environment so the enterprise may elect to use virtualization techniques to permit mobile access to such applications and data. An enterprise may elect to provide both fully secured and fully functional applications on the mobile device as well as a virtualization application to allow access to applications that are deemed more properly operated on the server side. In an embodiment, the virtualization application may store some data, files, etc. on the mobile phone in one of the secure storage locations. An enterprise, for example, may elect to allow certain information to be stored on the phone while not permitting other information.
In connection with the virtualization application, as described herein, the mobile device may have a virtualization application that is designed to present GUI's and then record user interactions with the GUI. The application may communicate the user interactions to the server side to be used by the server side application as user interactions with the application. In response, the application on the server side may transmit back to the mobile device a new GUI. For example, the new GUI may be a static page, a dynamic page, an animation, or the like.
The applications running on the managed partition may be stabilized applications. The stabilized applications may be managed by adevice manager324. Thedevice manager324 may monitor the stabilized applications and utilize techniques for detecting and remedying problems that would result in a destabilized application if such techniques were not utilized to detect and remedy the problems.
The secure applications may access data stored in asecure data container328 in the managedpartition310 of the mobile device. The data secured in the secure data container may be accessed by the secure wrappedapplications314, applications executed by a secure application launcher318,virtualization applications326 executed by a secure application launcher318, and the like. The data stored in thesecure data container328 may include files, databases, and the like. The data stored in thesecure data container328 may include data restricted to a specificsecure application330, shared amongsecure applications332, and the like. Data restricted to a secure application may include securegeneral data334 and highlysecure data338. Secure general data may use a strong form of encryption such as AES 128-bit encryption or the like, while highlysecure data338 may use a very strong form of encryption such as AES 254-bit encryption. Data stored in thesecure data container328 may be deleted from the device upon receipt of a command from thedevice manager324. The secure applications may have a dual-mode option340. The dual mode option340 may present the user with an option to operate the secured application in an unsecured mode. In an unsecured mode, the secure applications may access data stored in anunsecured data container342 on the unmanaged partition312 of themobile device302. The data stored in an unsecured data container may be personal data344. The data stored in anunsecured data container342 may also be accessed by unsecured applications348 that are running on the unmanaged partition312 of themobile device302. The data stored in anunsecured data container342 may remain on themobile device302 when the data stored in thesecure data container328 is deleted from themobile device302. An enterprise may want to delete from the mobile device selected or all data, files, and/or applications owned, licensed or controlled by the enterprise (enterprise data) while leaving or otherwise preserving personal data, files, and/or applications owned, licensed or controlled by the user (personal data). This operation may be referred to as a selective wipe. With the enterprise and personal data arranged in accordance to the aspects described herein, an enterprise may perform a selective wipe.
The mobile device may connect toenterprise resources304 andenterprise services308 at an enterprise, to the public Internet348, and the like. The mobile device may connect toenterprise resources304 andenterprise services308 through virtual private network connections. The virtual private network connections may be specific toparticular applications350, particular devices, particular secured areas on the mobile device, and the like (e.g.,352). For example, each of the wrapped applications in the secured area of the phone may access enterprise resources through an application specific VPN such that access to the VPN would be granted based on attributes associated with the application, possibly in conjunction with user or device attribute information. The virtual private network connections may carry Microsoft Exchange traffic, Microsoft Active Directory traffic, HTTP traffic, HTTPS traffic, application management traffic, and the like. The virtual private network connections may support and enable single-sign-on authentication processes354. The single-sign-on processes may allow a user to provide a single set of authentication credentials, which are then verified by anauthentication service358. Theauthentication service358 may then grant to the user access tomultiple enterprise resources304, without requiring the user to provide authentication credentials to eachindividual enterprise resource304.
The virtual private network connections may be established and managed by anaccess gateway360. Theaccess gateway360 may include performance enhancement features that manage, accelerate, and improve the delivery ofenterprise resources304 to themobile device302. The access gateway may also re-route traffic from themobile device302 to the public Internet348, enabling themobile device302 to access publicly available and unsecured applications that run on the public Internet348. The mobile device may connect to the access gateway via a transport network362. The transport network362 may be a wired network, wireless network, cloud network, local area network, metropolitan area network, wide area network, public network, private network, and the like.
Theenterprise resources304 may include email servers, file sharing servers, SaaS applications, Web application servers, Windows application servers, and the like. Email servers may include Exchange servers, Lotus Notes servers, and the like. File sharing servers may include SHAREFILE servers, other file sharing services, and the like. SaaS applications may include Salesforce, and the like. Windows application servers may include any application server that is built to provide applications that are intended to run on a local Windows operating system, and the like. Theenterprise resources304 may be premise-based resources, cloud based resources, and the like. Theenterprise resources304 may be accessed by themobile device302 directly or through theaccess gateway360. Theenterprise resources304 may be accessed by themobile device302 via a transport network362. The transport network362 may be a wired network, wireless network, cloud network, local area network, metropolitan area network, wide area network, public network, private network, and the like.
The enterprise services308 may includeauthentication services358,threat detection services364,device manager services324,file sharing services368,policy manager services370,social integration services372,application controller services374, and the like.Authentication services358 may include user authentication services, device authentication services, application authentication services, data authentication services and the like.Authentication services358 may use certificates. The certificates may be stored on themobile device302, by theenterprise resources304, and the like. The certificates stored on themobile device302 may be stored in an encrypted location on the mobile device, the certificate may be temporarily stored on themobile device302 for use at the time of authentication, and the like.Threat detection services364 may include intrusion detection services, unauthorized access attempt detection services, and the like. Unauthorized access attempt detection services may include unauthorized attempts to access devices, applications, data, and the like.Device management services324 may include configuration, provisioning, security, support, monitoring, reporting, and decommissioning services.File sharing services368 may include file management services, file storage services, file collaboration services, and the like.Policy manager services370 may include device policy manager services, application policy manager services, data policy manager services, and the like.Social integration services372 may include contact integration services, collaboration services, integration with social networks such as Facebook, Twitter, and LinkedIn, and the like.Application controller services374 may include management services, provisioning services, deployment services, assignment services, revocation services, wrapping services, and the like.
The enterprise mobilitytechnical architecture300 may include anapplication store378. Theapplication store378 may include unwrappedapplications380,pre-wrapped applications382, and the like. Applications may be populated in theapplication store378 from theapplication controller374. Theapplication store378 may be accessed by themobile device302 through theaccess gateway360, through the public Internet348, or the like. The application store may be provided with an intuitive and easy to use user interface. Theapplication store378 may provide access to asoftware development kit384. Thesoftware development kit384 may provide a user the capability to secure applications selected by the user by wrapping the application as described previously in this description. An application that has been wrapped using thesoftware development kit384 may then be made available to themobile device302 by populating it in theapplication store378 using theapplication controller374.
The enterprise mobilitytechnical architecture300 may include a management and analytics capability. The management and analytics capability may provide information related to how resources are used, how often resources are used, and the like. Resources may include devices, applications, data, and the like. How resources are used may include which devices download which applications, which applications access which data, and the like. How often resources are used may include how often an application has been downloaded, how many times a specific set of data has been accessed by an application, and the like.
FIG. 4 is another illustrative enterprisemobility management system400. Some of the components of themobility management system300 described above with reference toFIG. 3 have been omitted for the sake of simplicity. The architecture of thesystem400 depicted inFIG. 4 is similar in many respects to the architecture of thesystem300 described above with reference toFIG. 3 and may include additional features not mentioned above.
In this case, the left hand side represents an enrolled mobile device402 (e.g.,client107,212,302, etc.) with aclient agent404, which interacts with gateway server406 (which includes access gateway and application controller functionality) to accessvarious enterprise resources408 andservices409 such as Exchange, Sharepoint, PKI Resources, Kerberos Resources, and Certificate Issuance Service, as shown on the right hand side above. Although not specifically shown, themobile device402 may also interact with an enterprise application store (e.g., StoreFront) for the selection and downloading of applications.Client agent404 may, for example, be a software application executing on a client device that facilitates communications with remote resources and/or virtualized resources.Gateway server406 may, for example, be a server or other resource that provides access to enterprise resources and/or cloud resources.
Theclient agent404 acts as the UI (user interface) intermediary for Windows apps/desktops hosted in an Enterprise data center, which are accessed using the HDX/ICA display remoting protocol, or any other remoting protocol. Theclient agent404 also supports the installation and management of native applications on themobile device402, such as native iOS or Android applications. For example, the managed applications410 (mail, browser, wrapped application) shown in the figure above are all native applications that execute locally on the device.Client agent404 and an application management framework, such as MDX (mobile experience technology) by Citrix Systems Inc. of Fort Lauderdale, Fla. (other application management frameworks may also be used), act to provide policy driven management capabilities and features such as connectivity and SSO (single sign on) to enterprise resources/services408. Theclient agent404 handles primary user authentication to the enterprise, normally to the access gateway (AG) with SSO to other gateway server components. Theclient agent404 obtains policies fromgateway server406 to control the behavior of the managedapplications410 on themobile device402. As used herein, a managed application is one that is capable of being controlled based on and operated in accordance with independently defined and communicated policy files.
Thesecure IPC links412 between thenative applications410 andclient agent404 represent a management channel, which allows client agent to supply policies to be enforced by theapplication management framework414 “wrapping” each application. TheIPC channel412 also allowsclient agent404 to supply credential and authentication information that enables connectivity and SSO toenterprise resources408. Finally theIPC channel412 allows theapplication management framework414 to invoke user interface functions implemented byclient agent404, such as online and offline authentication.
Communications between theclient agent404 andgateway server406 are essentially an extension of the management channel from theapplication management framework414 wrapping each native managedapplication410. Theapplication management framework414 requests policy information fromclient agent404, which in turn requests it fromgateway server406. Theapplication management framework414 requests authentication, andclient agent404 logs into the gateway services part of gateway server406 (also known as NetScaler Access Gateway).Client agent404 may also call supporting services ongateway server406, which may produce input material to derive encryption keys for the local data vaults416, or provide client certificates which may enable direct authentication to PKI protected resources, as more fully explained below.
In more detail, theapplication management framework414 “wraps” each managedapplication410. This may be incorporated via an explicit build step, or via a post-build processing step. Theapplication management framework414 may “pair” with client agent614 on first launch of anapplication410 to initialize the secure IPC channel and obtain the policy for that application. Theapplication management framework414 may enforce relevant portions of the policy that apply locally, such as the client agent login dependencies and some of the containment policies that restrict how local OS services may be used, or how they may interact with theapplication410.
Theapplication management framework414 may use services provided byclient agent404 over thesecure IPC channel412 to facilitate authentication and internal network access. Key management for the private and shared data vaults416 (containers) may be also managed by appropriate interactions between the managedapplications410 andclient agent404.Vaults416 may be available only after online authentication, or may be made available after offline authentication if allowed by policy. First use ofvaults416 may require online authentication, and offline access may be limited to at most the policy refresh period before online authentication is again required.
Network access to internal resources may occur directly from individual managedapplications410 throughaccess gateway406. Theapplication management framework414 is responsible for orchestrating the network access on behalf of eachapplication410.Client agent404 may facilitate these network connections by providing suitable time limited secondary credentials obtained following online authentication. Multiple modes of network connection may be used, such as reverse web proxy connections and end-to-end VPN-style tunnels418.
The mail and browser managedapplications410 have special status and may make use of facilities that might not be generally available to arbitrary wrapped applications. For example, the mail application may use a special background network access mechanism that allows it to access Exchange over an extended period of time without requiring a full AD logon. The browser application may use multiple private data vaults to segregate different kinds of data.
This architecture supports the incorporation of various other security features. For example, gateway server406 (including its gateway services) in some cases will not need to validate AD passwords. It can be left to the discretion of an enterprise whether an AD password is used as an authentication factor for some users in some situations. Different authentication methods may be used if a user is online or offline (i.e., connected or not connected to a network).
Step up authentication is a feature whereingateway server406 may identify managednative applications410 that are allowed to have access to highly classified data requiring strong authentication, and ensure that access to these applications is only permitted after performing appropriate authentication, even if this means a re-authentication is required by the user after a prior weaker level of login.
Another security feature of this solution is the encryption of the data vaults416 (containers) on themobile device402. Thevaults416 may be encrypted so that all on-device data including files, databases, and configurations are protected. For on-line vaults, the keys may be stored on the server (gateway server406), and for off-line vaults, a local copy of the keys may be protected by a user password. When data is stored locally on thedevice402 in thesecure container416, it is preferred that a minimum of AES 256 encryption algorithm be utilized.
Other secure container features may also be implemented. For example, a logging feature may be included, wherein all security events happening inside anapplication410 are logged and reported to the backend. Data wiping may be supported, such as if theapplication410 detects tampering, associated encryption keys may be written over with random data, leaving no hint on the file system that user data was destroyed. Screenshot protection is another feature, where an application may prevent any data from being stored in screenshots. For example, the key window's hidden property may be set to YES. This may cause whatever content is currently displayed on the screen to be hidden, resulting in a blank screenshot where any content would normally reside.
Local data transfer may be prevented, such as by preventing any data from being locally transferred outside the application container, e.g., by copying it or sending it to an external application. A keyboard cache feature may operate to disable the autocorrect functionality for sensitive text fields. SSL certificate validation may be operable so the application specifically validates the server SSL certificate instead of it being stored in the keychain. An encryption key generation feature may be used such that the key used to encrypt data on the device is generated using a passphrase supplied by the user (if offline access is required). It may be XORed with another key randomly generated and stored on the server side if offline access is not required. Key derivation functions may operate such that keys generated from the user password use KDFs (key derivation functions, notably PBKDF2) rather than creating a cryptographic hash of it. The latter makes a key susceptible to brute force or dictionary attacks.
Further, one or more initialization vectors may be used in encryption methods. An initialization vector will cause multiple copies of the same encrypted data to yield different cipher text output, preventing both replay and cryptanalytic attacks. This will also prevent an attacker from decrypting any data even with a stolen encryption key if the specific initialization vector used to encrypt the data is not known. Further, authentication then decryption may be used, wherein application data is decrypted only after the user has authenticated within the application. Another feature may relate to sensitive data in memory, which may be kept in memory (and not in disk) only when it's needed. For example, login credentials may be wiped from memory after login, and encryption keys and other data inside objective-C instance variables are not stored, as they may be easily referenced. Instead, memory may be manually allocated for these.
An inactivity timeout may be implemented, wherein after a policy-defined period of inactivity, a user session is terminated.
Data leakage fromapplication management framework414 may be prevented in other ways. For example, when anapplication410 is put in the background, the memory may be cleared after a predetermined (configurable) time period. When backgrounded, a snapshot may be taken of the last displayed screen of the application to fasten the foregrounding process. The screenshot may contain confidential data and hence should be cleared.
Another security feature relates to the use of an OTP (one time password)420 without the use of an AD (active directory)422 password for access to one or more applications. In some cases, some users do not know (or are not permitted to know) their AD password, so these users may authenticate using anOTP420 such as by using a hardware OTP system like SecurID (OTPs may be provided by different vendors also, such as Entrust or Gemalto). In some cases, after a user authenticates with a user ID, a text is sent to the user with anOTP420. In some cases, this may be implemented only for online use, with a prompt being a single field.
An offline password may be implemented for offline authentication for thoseapplications410 for which offline use is permitted via enterprise policy. For example, an enterprise may want the enterprise application store to be accessed in this manner. In this case, theclient agent404 may require the user to set a custom offline password and the AD password is not used.Gateway server406 may provide policies to control and enforce password standards with respect to the minimum length, character class composition, and age of passwords, such as described by the standard Windows Server password complexity requirements, although these requirements may be modified.
Another feature relates to the enablement of a client side certificate forcertain applications410 as secondary credentials (for the purpose of accessing PKI protected web resources via the application management framework micro VPN feature). For example, an application such as a corporate email application may utilize such a certificate. In this case, certificate-based authentication using ActiveSync protocol may be supported, wherein a certificate from theclient agent404 may be retrieved bygateway server406 and used in a keychain. Each managed application may have one associated client certificate, identified by a label that is defined ingateway server406.
Gateway server406 may interact with an enterprise special purpose web service to support the issuance of client certificates to allow relevant managed applications to authenticate to internal PKI protected resources.
Theclient agent404 andapplication management framework414 may be enhanced to support obtaining and using client certificates for authentication to internal PKI protected network resources. More than one certificate may be supported, such as to match various levels of security and/or separation requirements. The certificates may be used by the mail and browser managed applications, and ultimately by arbitrary wrapped applications (provided those applications use web service style communication patterns where it is reasonable for application management framework to mediate HTTPS requests).
Application management framework client certificate support on iOS may rely on importing a PKCS 12 BLOB (Binary Large Object) into the iOS keychain in each managed application for each period of use. Application management framework client certificate support may use a HTTPS implementation with private in-memory key storage. The client certificate will never be present in the iOS keychain and will not be persisted except potentially in “online-only” data value that is strongly protected.
Mutual SSL may also be implemented to provide additional security by requiring that amobile device402 is authenticated to the enterprise, and vice versa. Virtual smart cards for authentication togateway server406 may also be implemented.
Both limited and full Kerberos support may be additional features. The full support feature relates to an ability to do full Kerberos login toAD422, using an AD password or trusted client certificate, and obtain Kerberos service tickets to respond to HTTP negotiate authentication challenges. The limited support feature relates to constrained delegation in AFEE, where AFEE supports invoking Kerberos protocol transition so it can obtain and use Kerberos service tickets (subject to constrained delegation) in response to HTTP negotiate authentication challenges. This mechanism works in reverse web proxy (a.k.a. CVPN) mode, and when HTTP (but not HTTPS) connections are proxied in VPN and MicroVPN mode.
Another feature relates to application container locking and wiping, which may automatically occur upon jail-break or rooting detections, and occur as a pushed command from administration console, and may include a remote wipe functionality even when anapplication410 is not running.
A multi-site architecture or configuration of the enterprise application store and application controller may be supported that allows users to be service from one of several different locations in case of failure.
In some cases, managedapplications410 may be allowed to access a certificate and private key via an API (example OpenSSL). Trusted managedapplications410 of an enterprise may be allowed to perform specific Public Key operations with an application's client certificate and private key. Various use cases may be identified and treated accordingly, such as when an application behaves like a browser and no certificate access is required, when an application reads a certificate for “who am I,” when an application uses the certificate to build a secure session token, and when an application uses private keys for digital signing of important data (e.g. transaction log) or for temporary data encryption.
Managed Browser Features
Having discussed several examples of the computing architecture and the enterprise mobility management architecture that may be used in providing and/or implementing various aspects of the disclosure, a number of embodiments will now be discussed in greater detail. In particular, and as introduced above, some aspects of the disclosure generally relate to providing a managed browser. In the description below, various examples illustrating how a managed browser may be provided in accordance with one or more embodiments will be discussed.
FIG. 5 depicts a flowchart that illustrates a method of creating an application tunnel from a managed browser to one or more enterprise resources in accordance with one or more illustrative aspects discussed herein. In one or more embodiments, the method illustrated inFIG. 5 and/or one or more steps thereof may be performed by a computing device (e.g., generic computing device201). In other embodiments, the method illustrated inFIG. 5 and/or one or more steps thereof may be embodied in computer-executable instructions that are stored in a computer-readable medium, such as a non-transitory computer-readable memory.
As seen inFIG. 5, the method may begin atstep505 in which a managed browser may be loaded. For example, instep505, a computing device (e.g., a mobile computing device, such as a laptop computer, tablet computer, smart phone, or other type of mobile device) may load a managed browser (e.g., by opening and/or otherwise initiating execution of a managed browser). In one or more embodiments, the managed browser may be a web browser that is configured to provide one or more enterprise security features (e.g., mobile device management features, mobile application management features, policy acquisition and enforcement features, etc.). Additionally or alternatively, the managed browser may extend various enterprise security features for use with mobile device applications that may be configured to run within the browser. For example, an enterprise may require some or all of its employees and/or other users to install and use the managed browser on their respective mobile devices in a bring-your-own-device (BYOD) scheme to reduce enterprise security risks. In addition, the managed browser can, for instance, be used to enable mobile device users to access a corporate intranet and/or other enterprise resources without connecting to a virtual private network (VPN). For instance, the managed browser may implement and/or provide application tunneling functionalities, such as those discussed in greater detail below, to enable such access to a corporate intranet and/or other enterprise resources.
In one or more embodiments, the managed browser may additionally or alternatively be configured to provide secure browsing and caching of data obtained from at least one enterprise resource. For example, in addition to being configured to obtain data from an enterprise resource (e.g., a server or database connected to and/or otherwise part of an enterprise network), the managed browser may be further configured to securely cache the obtained data (e.g., in one or more local caches, which may be encrypted using one or more encryption protocols). Additionally or alternatively, the managed browser may be further configured to provide secure browsing of the obtained data (e.g., by controlling and providing access to the obtained data based on validation of one or more authentication credentials, based on compliance with and/or enforcement of one or more mobile device management and/or mobile application management policies, etc.).
In one or more embodiments, the managed browser may be configured to provide at least one managed mode in which one or more policies are applied to the managed browser. The one or more policies may, for instance, be configured to limit one or more functions of the managed browser. For example, the one or more policies may selectively restrict the types of information that can be accessed using the managed browser, the resources (e.g., enterprise resources, network resources, etc.) that can be accessed using the managed browser, the users that can access information using the managed browser, the times at which the managed browser can be used to access specific types of information, the locations at which the managed browser can be used to access specific types of information, and/or other may impose other restrictions. In some arrangements, at least one policy of the one or more policies may limit and/or otherwise restrict application tunneling functionalities of the managed browser, as discussed below. Additionally or alternatively, the managed browser may be configured to provide at least one unmanaged mode in which the one or more policies (which, e.g., may be applied to the browser in the managed mode) might not be applied to the managed browser, such that the managed browser may operate without the restrictions that might be imposed by the one or more policies.
Instep510, a request to access one or more enterprise resources via the managed browser may be received. For example, instep510, the computing device may receive a request to access one or more enterprise resources via the managed browser. Such a request may, for instance, be based on and/or correspond to user input received by the computing device via the managed browser (e.g., based on a user selecting a link and/or otherwise requesting access to a network resource using the managed browser).
Instep515, at least one application tunnel may be created from the managed browser to the one or more enterprise resources. For example, instep515, the computing device may create and/or otherwise establish one or more VPN-style tunnels to enterprise servers and/or other enterprise resources that may, for instance, enable the managed browser to securely access and obtain enterprise data from the enterprise servers and/or other enterprise resources. In one or more arrangements, application tunneling may include techniques in which one network protocol (e.g., the delivery protocol) encapsulates a different network protocol. By using application tunneling, a secure path may be provided through an untrusted network.
In some embodiments, creating the at least one application tunnel may include creating a first application tunnel from the managed browser to a first enterprise resource, and creating a second application tunnel from the managed browser to a second enterprise resource, where the second enterprise resource is different from the first enterprise resource. For example, in creating one or more application tunnels (e.g., in step515), the computing device may create a different individual application tunnel for each enterprise resource that may be accessed by the managed browser. In some instances, the first enterprise resource may have a first security level and the second enterprise resource may have a second security level different from the first security level. For example, the second enterprise resource may have a higher security level than the first enterprise resource, and additional authentication credentials and/or more secure access protocols and/or encryption methods may be needed to access the second enterprise resource (e.g., as compared to accessing the first enterprise resource).
In some embodiments, the at least one application tunnel may be created (e.g., in step515) based on one or more policies that may be applied to the managed browser. For example, in creating the at least one application tunnel, the managed browser and/or the computing device on which the managed browser is running may create the at least one application tunnel in accordance with one or more policies that may be applied to the managed browser and/or may selectively limit and/or otherwise restrict the managed browser's ability to create and/or use application tunnels. For example, at least one policy of the one or more policies may selectively restrict the types of information that can be accessed using an application tunnel, the resources that can be accessed using an application tunnel, the users that can access information using an application tunnel, the times at which the managed browser can create an application tunnel, the locations at which the managed browser can create an application tunnel, and/or other may impose other restrictions.
Instep520, enterprise data from the one or more enterprise resources may be obtained via the at least one application tunnel. For example, instep520, the computing device may obtain enterprise data from the one or more enterprise resources via the application tunnel(s) created instep515. In addition to obtaining the enterprise data, the computing device also may provide access to the obtained enterprise data via the managed browser (e.g., by causing some or all of the obtained enterprise data to be displayed in the managed browser).
In some embodiments, one or more policies may be applied to the managed browser. In addition, the one or more policies may be configured to limit at least one function of the managed browser. For example, the one or more policies may define certain circumstances in which certain function(s) of the managed browser are to be selectively disabled, and the computing device may detect and/or otherwise identify these circumstances (e.g., based on device state information, as discussed below) and subsequently disable the function(s) in accordance with the one or more policies. Some examples of the functions of the managed browser that may be limited by a policy in some instances include cut-and-paste functions, instant messaging functions, and video chat functions. While these functions are listed here as examples of the functions that may be limited in some instances, other functions may be similarly limited in other instances.
In some embodiments, one or more policies may be applied to the managed browser, and at least one policy of the one or more policies may be configured to limit usage of the obtained enterprise data. For example, the one or more policies may define certain circumstances in which the enterprise data (e.g., the enterprise data obtained via the application tunnel(s) by the computing device and/or the managed browser in step520) can only be used in certain ways, and the computing device may detect and/or otherwise identify these circumstances (e.g., based on device state information, as discussed below) and subsequently restrict and/or otherwise control the way(s) in which the data can be used in accordance with the one or more policies. For instance, at least one policy of the one or more policies may be configured to limit the circumstances in which the obtained enterprise data can be copied and pasted (e.g., from the managed browser into another application). As another example, at least one policy of the one or more policies may be configured to limit the circumstances in which the obtained enterprise data can be saved or printed (e.g., by the managed browser and/or by the computing device).
In some embodiments, at least one policy of the one or more policies may depend on device state information. For example, the limit(s) on the function(s) of the managed browser (e.g., as imposed by the one or more policies) and/or the limit(s) on the way(s) in which enterprise data may be used by the managed browser (e.g., as additionally or alternatively imposed by the one or more policies) may be depend on state information that is indicative of the current state of the computing device. Such state information may, for instance, be collected and/or monitored by a mobile resource management (MRM) agent that is configured to run on the computing device (e.g., as a background application, service, or process) and which may, for instance, incorporate one or more aspects of client agent404 (discussed above). The MRM agent may, for instance, provide and/or be configured to provide mobile device management (MDM) functionalities, mobile application management (MAM) functionalities, and/or other functionalities. For example, the MRM agent may be configured to collect and/or monitor device-level state information, such as state information that is indicative of the operating systems and/or applications that are stored on and/or running on the device, state information that is indicative of the network connections that are available to and/or being used by the device, and/or state information that is indicative of the current location of where the device is located and/or being used (e.g., in terms of geographic coordinates; in terms of semantic labels, such as “home” or “work;” etc.). While these types of state information are listed here as examples of the types of state information that may be collected and/or monitored (e.g., by the MRM agent, by one or more other applications or services or processes on the computing device, etc.) in some instances, additional and/or alternative types of state information may be similarly collected and/or monitored in other instances. In addition, any and/or all of this state information may be used (e.g., by the computing device and/or by the managed browser) in applying and/or enforcing policies on the managed browser, such as the policies discussed above.
FIG. 6 depicts a flowchart that illustrates a method of extending a managed browser session across a device cloud in accordance with one or more illustrative aspects discussed herein. In one or more embodiments, the method illustrated inFIG. 6 and/or one or more steps thereof may be performed by a computing device (e.g., generic computing device201). In other embodiments, the method illustrated inFIG. 6 and/or one or more steps thereof may be embodied in computer-executable instructions that are stored in a computer-readable medium, such as a non-transitory computer-readable memory.
As seen inFIG. 6, the method may begin atstep605 in which a managed browser may be loaded. For example, instep605, a computing device (e.g., a mobile computing device, such as a laptop computer, tablet computer, smart phone, or other type of mobile device) may load a managed browser, similar to how such a managed browser may be loaded in step505 (discussed above). The managed browser may, for instance, be configured to provide at least one managed mode in which one or more policies are applied to the managed browser, and the one or more policies may be configured to limit one or more functions of the managed browser, as discussed above. Additionally, the managed browser may, in some embodiments, be configured to provide secure browsing and caching of data obtained from at least one enterprise resource.
Instep610, a connection to at least one other computing device may be established to initiate a device cloud. For example, instep610, the computing device may establish a network connection to one or more other computing devices to initiate a device cloud. In one or more arrangements, a device cloud may, for instance, enable two or more computing devices to be used in combination with each other to perform a single function or task. In typical instances, the devices may be used by the same user and/or both may be located near each other (e.g., within a predetermined distance of each other) and/or near the user (e.g., within a predetermined distance of the user). In some instances, a device cloud may be used to provide a function that is not supported by one of the user's devices, but is supported by another one of the user's devices. For example, a user of a laptop computer may wish to conduct a video conference with another person, but the laptop computer might not include a camera. If the user also has a smart phone (or other computing device) that includes a camera, however, a device cloud may be used to dynamically link the functionalities provided by the two devices so that they may be used in providing the video conference. In particular, in this example, a device cloud may be established such that the user's smart phone may be used as a video input device for the video conference (which may, e.g., be facilitated by a video conferencing plug-in, applet, web application, etc. that may be running within the managed browser), while the user's laptop computer can be used to perform other functions that may be involved in conducting the video conference (e.g., establishing the connection to the other person's device(s), providing text-based chat functionalities, etc.). While this example illustrates some ways in which a device cloud may be used to extend the functionalities of one or more devices in some embodiments, such a device cloud may be used in other ways to extend additional and/or alternative functionalities of various devices in other embodiments.
Instep615, a session of the managed browser may be extended across the device cloud. For example, instep615, the computing device may extend a session of the managed browser (e.g., a current session of the managed browser with which a user of the computing device is interacting) across the device cloud (e.g., the device cloud created in step610). In one or more arrangements, extending the session of the managed browser across the device cloud may include causing at least one other managed browser to be loaded on the at least one other computing device, and sharing session data with the at least one other managed browser. For example, in extending a session of the managed browser across the device cloud, the computing device may initially cause instance(s) of the managed browser to be loaded on the other device(s) participating in the device cloud. Subsequently, the computing device may share session data with the instance(s) of the managed browser that are running on the other device(s) participating in the device cloud. In sharing such session data, the computing device may, for instance, send some or all of the information that is currently being used and/or displayed by the managed browser on the computing device, which may include enterprise data and/or non-enterprise data. Additionally or alternatively, in sharing session data with the instance(s) of the managed browser that are running on the other device(s) participating in the device cloud, the computing device may receive information that may be subsequently displayed and/or otherwise used by the managed browser on the computing device.
In some embodiments, one or more policies may be applied to the managed browser, and the one or more policies may be configured to limit at least one function of the managed browser. For example, the computing device and/or software running on the computing device (such as an MRM agent) may apply one or more policies to the managed browser that are configured to limit function(s) of the managed browser, as discussed above.
In some embodiments, one or more policies may be applied to the managed browser, and the one or more policies may be configured to limit the device cloud. For example, the computing device and/or software running on the computing device (such as an MRM agent) may, in some instances, apply one or more policies to the managed browser that are configured limit various aspects of the device cloud (e.g., the device cloud created in step610). In some instances in which the one or more policies are configured to limit the device cloud, at least one policy of the one or more policies may be configured to allocate at least one role to the at least one other computing device. For example, in instances in which the one or more policies are configured to limit the device cloud, the computing device and/or the software running on the computing device may define, apply, and/or enforce at least one policy that is configured to allocate particular role(s) in the device cloud to the other computing device(s) that are participating in the device cloud. For instance, in the example discussed above involving a video conference, the mobile device management policies may allocate a video capturing role to the smart phone involved in the device cloud, and the mobile device management policies may allocate a connection maintenance role to the laptop computer involved in the device cloud.
In some embodiments, the connection to the at least one other computing device may be established based on at least one policy of the one or more policies that may be applied to the managed browser. For example, in establishing the connection to the at least one other computing device, the managed browser and/or the computing device on which the managed browser is running may connect to and/or exchange data with the at least one other computing device in accordance with one or more policies that may be applied to the managed browser. For instance, the one or more policies may define certain circumstances in which the managed browser's ability to initiate the device cloud may be selectively enabled, selectively disabled, and/or otherwise restricted. For example, at least one policy of the one or more policies may selectively restrict the types of information that can be exchanged with the other computing device(s), the users that can access information exchanged with the other computing device(s), the times at which the managed browser can exchange information with the other computing device(s), the locations at which the managed browser can exchange information with the other computing device(s), and/or other may impose other restrictions. Any and/or all of these restrictions may limit the circumstances in which the computing device can establish a connection to the at least one other computing device and/or may otherwise limit the circumstances in which the device cloud can be initiated.
In some embodiments, establishing the connection to the at least one other computing device may include evaluating state information associated with the at least one other computing device, and determining, based on the evaluated state information, to allow the at least one other computing device to participate in the device cloud. For example, in establishing the connection to the at least one other computing device (e.g., in step610), the computing device may obtain and/or evaluate state information associated with the at least one other computing device. Such state information may, for instance, describe various aspects of the current device state of the at least one other computing device, such as the applications that may be installed and/or running on the at least one other computing device, the networks to which the at least one other computing device is connected to, the location of the at least one other computing device, and/or other considerations. Subsequently, the computing device may determine, based on evaluating this state information, whether to allow the at least one other computing device to participate in the device cloud. Such a determination may, for instance, be based on one or more policies. For example, one or more policies may dictate that the computing device may allow the at least one other computing device to participate in the device cloud if the state information associated with the at least one other computing device indicates that the device is or is not located in a certain location, does or does not have certain applications installed and/or running on the device, is or is not connected to one or more specific networks, and/or the like.
FIG. 7 depicts a flowchart that illustrates a method of selectively disabling an operational mode of a managed browser in accordance with one or more illustrative aspects discussed herein. In one or more embodiments, the method illustrated inFIG. 7 and/or one or more steps thereof may be performed by a computing device (e.g., generic computing device201). In other embodiments, the method illustrated inFIG. 7 and/or one or more steps thereof may be embodied in computer-executable instructions that are stored in a computer-readable medium, such as a non-transitory computer-readable memory.
As seen inFIG. 7, the method may begin atstep705 in which a managed browser may be loaded. For example, instep705, a computing device (e.g., a mobile computing device, such as a laptop computer, tablet computer, smart phone, or other type of mobile device) may load a managed browser, similar to how such a managed browser may be loaded in step505 (discussed above). The managed browser may, for instance, be configured to provide at least one managed mode in which one or more policies are applied to the managed browser, and the one or more policies may be configured to limit one or more functions of the managed browser, as discussed above. Additionally, the managed browser may, in some embodiments, be configured to provide secure browsing and caching of data obtained from at least one enterprise resource.
In one or more arrangements, the managed browser may be a dual-mode application that has a managed mode and an unmanaged mode. In addition, the managed mode of the managed browser may be configured to provide access to enterprise data, and the unmanaged mode of the managed browser may be configured to limit access to enterprise data. For example, in the managed mode, the managed browser may apply specific content filters, restrict specific downloads, and/or block specific plug-ins, whereas in the unmanaged mode, the managed browser might not apply such filters, restrict such downloads, and/or block such plug-ins. In some instances, the computing device and/or other software running on the computing device (e.g., an MRM agent) may selectively disable the managed mode of the managed browser, as discussed below, such that the managed browser might only be able to run and/or continue running in the unmanaged mode (e.g., until the managed mode of the managed browser is re-enabled by the computing device and/or by the other appropriate software running on the computing device).
Instep710, device state information may be obtained. For example, instep710, the computing device may obtain state information that is indicative of the current state of the computing device. In some instances, such state information may be obtained by an MRM agent running on the computing device, such as the MRM agent discussed in the examples above.
In some embodiments, the device state information may include information identifying one or more applications that are present on the computing device. For example, in obtaining device state information (e.g., in step710), the computing device and/or the MRM agent running on the computing device may inspect one or more storage devices (which may, e.g., be connected to and/or otherwise accessible to the computing device) and/or installation logs (which may, e.g., be maintained by the computing device) to determine what application(s) are stored on the computing device, installed on the computing device, previously run on the computing device, and/or currently running on the computing device.
In some embodiments, the device state information may include information identifying one or more network connections that are used by the computing device. For example, in obtaining device state information (e.g., in step710), the computing device and/or the MRM agent running on the computing device may inspect one or more network interfaces and/or other network devices (which may, e.g., be connected to and/or otherwise usable by the computing device) and/or one or more connection logs (which may, e.g., be maintained by the computing device) to determine what network(s) are accessible to and/or in range of the computing device, what network(s) that computing device has previously connected to, and/or what network(s) the computing device is currently connected to.
In some embodiments, the device state information may include information identifying a current location of the computing device. For example, in obtaining device state information (e.g., in step710), the computing device and/or the MRM agent running on the computing device may determine and/or cause one or more other components (e.g., a GPS receiver, other positioning components, etc.) and/or devices to determine a current position of the computing device. In some instances, the location information may include geographic coordinates that are indicative of the current position of the computing device. In some instances, the location information may include semantic labels that are indicative of the current position of the computing device relative to one or more user-specific landmarks (e.g., “home” or “work”). Any and/or all of this location may, for instance, be used by the computing device and/or by the MRM agent running on the computing device in applying and/or enforcing one or more location-based mobile device management policies.
Instep715, it may be determined, based on the device state information, whether to selectively disable one or more operational modes of the managed browser. For example, instep715, the computing device may determine, based on the device state information obtained instep710, whether to selectively disable one or more operational modes of the managed browser. As discussed above, the managed browser may, in some instances, be a dual-mode application that has a managed mode and an unmanaged mode. Thus, in some instances, the computing device may, instep715, determine whether to selectively disable the managed mode of the managed browser based on the device state information obtained instep710. For example, the computing device may determine whether to selectively disable the managed mode of the managed browser based on information identifying one or more applications that are present on the computing device, information identifying one or more network connections that are used by the computing device, and/or information identifying a current location of the computing device. In some instances, the computing device may additionally or alternatively evaluate one or more policies in combination with the device state information in determining whether to selectively disable a mode of the managed browser (e.g., the managed mode of the managed browser).
If it is determined, instep715, not to disable one or more operational modes of the managed browser, then the method may end. Additionally or alternatively, the method may continue in a loop, such thatsteps710 and715 may be periodically repeated (e.g., to obtain updated device state information and/or reevaluate the updated device state information to determine whether to selectively disable one or more operational modes of the managed browser).
On the other hand, if it is determined, instep715, to selectively disable at least one operational mode of the managed browser, then instep720, the at least one operational mode of the managed browser may be disabled. For example, instep720, the computing device may disable the at least one operational mode of the managed browser (e.g., the mode(s) determined to be disabled in step715) and/or cause the at least one operational mode of the managed browser to be disabled. In instances in which the managed browser is a dual-mode application that has a managed mode and an unmanaged mode, the managed mode may, for example, be disabled by the computing device (and/or be caused to be disabled by the computing device) instep720.
In some embodiments, causing the at least one managed mode to be disabled may include causing the managed browser to enter a second mode different from the at least one managed mode. For example, in disabling the managed mode of the managed mode of the managed browser and/or otherwise causing the managed mode of the managed browser to be disabled (e.g., in step720), the computing device may cause the managed browser to enter a second mode that is different from the managed mode that the managed browser was previously operating in. In some instances, the second mode may be another managed mode that is simply different from the managed mode that the managed browser was previously operating in (e.g., because different policies are applied to the managed browser). In other words, the second mode may, in some instances, be a managed mode in which a second set of one or more policies is applied to the managed browser, where the second set of one or more policies includes at least one policy different from the one or more policies that are applied to the managed browser in the at least one managed mode.
In other instances, the second mode (which, e.g., the managed browser may enter after the at least one managed mode is disabled) may be an unmanaged mode in which the managed browser is no longer managed by at least one device manager. For example, in disabling the managed mode of the managed browser and/or otherwise causing the managed mode of the managed browser to be disabled (e.g., in step720), the computing device may cause the managed browser to enter an unmanaged mode, such as the unmanaged mode discussed above, in which the managed browser might not be managed by at least one device manager. Such a device manager may, for instance, be a mobile resource management agent that is running on the device and is configured to apply and/or enforce one or more policies on the managed browser and/or other applications, services, and/or functions of the device.
In some embodiments, access to one or more resources may be blocked in the unmanaged mode. For example, after entering the unmanaged mode, the managed browser and/or the computing device may block access to specific resources, such as specific enterprise resources. Such block may, for instance, prevent a user of the managed browser from accessing enterprise resources and/or other specific resources while the managed browser is operating in an unmanaged mode in which policy enforcement, monitoring, and/or other security features might not be applied and/or available to ensure the security of enterprise information that might otherwise be accessed using the managed browser. In addition to blocking access to remotely stored information in remote enterprise resources, the managed browser and/or the computing device also may, in the unmanaged mode, block access to specific information that may be cached locally on the device. For example, during the unmanaged mode, such blocking may prevent the managed browser from accessing locally-cached data that was originally obtained from enterprise resources, such as locally-cached enterprise application store information and/or other locally-cached enterprise information.
In some embodiments, the managed browser may be configured to transition from the unmanaged mode back to the at least one managed mode based on updated device state information. For example, after entering the unmanaged mode, the managed browser and/or the computing device may be configured to monitor and periodically reevaluate current device state information to determine whether the managed browser can reenter the managed mode (e.g., in which one or more policies may be applied to the managed browser, the managed browser may be managed by the device manager, etc.). If, for instance, the managed browser and/or the computing device determines that specific circumstances are satisfied, for instance, based on the state information, the computing device may cause the managed browser to switch back to the managed mode. In some instances, in determining whether the managed browser can reenter the managed mode, the computing device and/or the managed browser may, for instance, evaluate the current device state information in view of one or more policies, which may include the one or more policies that were evaluated in determining to switch the managed browser to the unmanaged mode in the first place.
FIG. 8 depicts a flowchart that illustrates a method of applying one or more mobile device management policies to a managed browser in accordance with one or more illustrative aspects discussed herein. In one or more embodiments, the method illustrated inFIG. 8 and/or one or more steps thereof may be performed by a computing device (e.g., generic computing device201). In other embodiments, the method illustrated inFIG. 8 and/or one or more steps thereof may be embodied in computer-executable instructions that are stored in a computer-readable medium, such as a non-transitory computer-readable memory.
As seen inFIG. 8, the method may begin atstep805 in which a managed browser may be loaded. For example, instep805, a computing device (e.g., a mobile computing device, such as a laptop computer, tablet computer, smart phone, or other type of mobile device) may load a managed browser, similar to how such a managed browser may be loaded in step505 (discussed above). The managed browser may, for instance, be configured to provide at least one managed mode in which one or more policies are applied to the managed browser, and the one or more policies may be configured to limit one or more functions of the managed browser, as discussed above. Additionally, the managed browser may, in some embodiments, be configured to provide secure browsing and caching of data obtained from at least one enterprise resource.
Instep810, one or more policies may be received. For example, instep810, the computing device may receive one or more policies. The one or more policies may, for instance, be mobile device management policies that define permitted, prohibited, and/or restricted functions based on different sets of circumstances that may be evaluated using device state information (e.g., device state information that is obtained and/or monitored by the computing device and/or by an MRM agent running on the computing device). Thus, the policies may be used in enforcing device-state-based behavior limitations on various functions, including various functions of the managed browser.
In some embodiments, the one or more policies may be received from a policy server. For example, in receiving the policies, the computing device may, instep810, connect to and/or receive a number of policies from a policy server. The policy server may, for instance, be part of an enterprise network infrastructure, and may be connected to and/or included in one or more enterprise resources that may be accessed by the managed browser in accordance with the policies that are received (e.g., by the computing device in step810).
In step815, the one or more policies may be applied to the managed browser. For example, in step815, the computing device may application the one or more policies (e.g., as received in step810) to the managed browser, such that certain functions of the managed browser may be selectively enabled and/or disabled (e.g., based on device state information being obtained and/or monitored by the computing device and/or by an MRM agent running on the computing device).
In some embodiments, the one or more policies may be applied to the managed browser based on identity information associated with a user of the computing device. For example, in applying the one or more policies to the managed browser (e.g., in step815), the computing device may request and/or obtain identity information associated with a current user of the computing device. Such identity information may, for instance, be obtained via one or more authentication prompts that are configured to prompt the user to provide his or her login information and/or other authentication credentials. By applying policies to the managed browser based on identity information, the specific functions that are selectively enabled, disabled, and/or restricted (e.g., by the one or more policies being applied to the managed browser) for the current user of the managed browser and/or the computing device may be more particularly tailored to the current user in view of their identity.
In some embodiments, the one or more policies may be applied to the managed browser based on role information associated with a user of the computing device. For example, in applying the one or more policies to the managed browser (e.g., in step815), the computing device may request and/or obtain identity information and/or role information associated with a current user of the computing device. The role information may, for instance, specify the role(s) of the current user within the enterprise (e.g., sales, engineering, legal, accounting, executive, etc.). In some instances, the computing device may, for example, determine role information for the current user of the computing device based on identity information for the current user of the computing device (e.g., by using the identity information to access and/or look up role information for the user in one or more databases, directories, and/or enterprise resources). By applying policies to the managed browser based on role information, the specific functions that are selectively enabled, disabled, and/or restricted (e.g., by the one or more policies being applied to the managed browser) for the current user of the managed browser and/or the computing device may be more particularly tailored to the needs of and/or access level of the current user in view their role(s) within the enterprise.
For example, in applying one or more policies to the managed browser based on role information in the context of a healthcare enterprise, such as a hospital, the computing device may determine whether the current user of the computing device is a doctor or a nurse (e.g., by obtaining and/or analyzing identity information for the current user of the computing device). If the computing device determines that the current user of the computing device is a doctor, the computing device may apply a first set of policies to the managed browser, and if the computing device determines that the current user of the computing device is a nurse, the computing device may apply a second set of policies to the managed browser that is different from the first set of policies. In particular, the second set of policies may, for instance, selectively enable, disable, and/or restrict additional and/or alternative functions of the managed browser than the first set of policies, based on the differences between the nurse's role in the healthcare enterprise and the doctor's role in the healthcare enterprise. For example, as a result of the policies that are applied to the managed browser, the doctor may, for instance, be able to use the managed browser on the computing device to access specific resources that the nurse might not be able to access.
As another example, in applying one or more policies to the managed browser based on role information in the context of a legal enterprise, such as a law firm, the computing device may determine whether the current user of the computing device is an attorney or other professional within a group of professionals that has been screened from specific cases and/or other matters being handling by the law firm. If the computing device determines that the current user of the computing device is within the group of professionals that has been screened, then the computing device map apply a first set of policies to the managed browser, and if the computing device determines that the current user of the computing device is not within the group of professionals that has been screened, then the computing device may apply a second set of policies to the managed browser that is different from the first set of policies. In particular, the second set of policies may, for instance, selectively enable, disable, and/or restrict additional and/or alternative functions of the managed browser than the first set of policies, based on the differences between certain professionals' roles in the legal enterprise. For example, as a result of the policies that are applied to the managed browser, certain lawyers may be able to use the managed browser on the computing device to access specific resources that other lawyers within the law firm might not be able to access.
In some embodiments, applying the one or more policies to the managed browser may include controlling access to one or more enterprise resources that are accessible via the managed browser. For example, in applying the one or more policies to the managed browser (e.g., in step815), the computing device may control access to the enterprise resource(s) that can be accessed using the managed browser. In particular, at least one policy of the one or more policies may, for instance, selectively enable, disable, and/or limit access to particular enterprise resource(s), such as particular databases, servers, and/or other enterprise resources (which may, e.g., be connected to and/or part of an enterprise infrastructure). Additionally or alternatively, such a policy may, for instance, depend on device state information (which may, e.g., include information identifying one or more applications that are present on the computing device, information identifying one or more network connections that are used by the computing device, and/or information identifying a current location of the computing device), such that access to particular enterprise resource(s) may be controlled based on the current state of the computing device.
In some embodiments, applying the one or more policies to the managed browser may include controlling use of information obtained from one or more enterprise resources via the managed browser. For example, in applying the one or more policies to the managed browser (e.g., in step815), the computing device may control how information obtained from the enterprise resource(s), such as information obtained from the enterprise resource(s) using the managed browser, can be used (e.g., by the managed browser and/or by other applications, services, and/or processes on the computing device). In particular, at least one policy of the one or more policies may, for instance, selectively allow, prohibit, and/or otherwise restrict the ability to save information obtained from the enterprise resource(s), the ability to print information obtained from the enterprise resource(s), the ability to cut, copy, and/or paste information obtained from the enterprise resource(s), the ability to edit information obtained from the enterprise resource(s), and/or other abilities to interact with and/or use the information obtained from the enterprise resource(s). Additionally or alternatively, such a policy may, for instance, depend on device state information (which may, e.g., include information identifying one or more applications that are present on the computing device, information identifying one or more network connections that are used by the computing device, and/or information identifying a current location of the computing device), such that usage of particular information obtained from the enterprise resource(s) may be controlled based on the current state of the computing device.
FIG. 9 depicts a flowchart that illustrates a method of providing access to a secure document container via a managed browser in accordance with one or more illustrative aspects discussed herein. In one or more embodiments, the method illustrated inFIG. 9 and/or one or more steps thereof may be performed by a computing device (e.g., generic computing device201). In other embodiments, the method illustrated inFIG. 9 and/or one or more steps thereof may be embodied in computer-executable instructions that are stored in a computer-readable medium, such as a non-transitory computer-readable memory.
As seen inFIG. 9, the method may begin atstep905 in which a managed browser may be loaded. For example, instep905, a computing device (e.g., a mobile computing device, such as a laptop computer, tablet computer, smart phone, or other type of mobile device) may load a managed browser, similar to how such a managed browser may be loaded in step505 (discussed above). The managed browser may, for instance, be configured to provide at least one managed mode in which one or more policies are applied to the managed browser, and the one or more policies may be configured to limit one or more functions of the managed browser, as discussed above. Additionally, the managed browser may, in some embodiments, be configured to provide secure browsing and caching of data obtained from at least one enterprise resource.
Instep910, a request to access one or more enterprise resources via the managed browser may be received. For example, instep910, the computing device may receive a request to access one or more enterprise resources via the managed browser. Such a request may, for instance, be based on and/or correspond to user input received by the computing device via the managed browser (e.g., based on a user selecting a link and/or otherwise requesting access to a network resource using the managed browser).
Instep915, enterprise data from the one or more enterprise resources may be obtained based on the request. For example, instep915, the computing device may connect to, request, and subsequently receive and/or otherwise obtain information from the one or more enterprise resources based on the request received instep910.
Instep920, the obtained enterprise data may be stored in a secure document container. For example, instep920, the computing device may store the enterprise data obtained instep915 in a secure document container. In one or more arrangements, the secure document container may be a data repository on the computing device that is configured to securely store enterprise data received by the computing device from one or more enterprise resources. Additionally or alternatively, one or more mobile device management policies may define certain circumstances in which access to the secure document container is to be restricted, modified, and/or otherwise controlled, and the computing device and/or an MRM agent running on the computing device may detect these circumstances based on device state information and subsequently restrict, modify, and/or otherwise control access to the secure document container in accordance with the policies. In other instances, other aspects of the secure document container (e.g., other than access to the secure document container) may be similarly controlled by one or more mobile device management policies.
Instep925, access to the secure document container may be provided via the managed browser. For example, instep925, the computing device may provide access to the secure document container via the managed browser. In providing access to the secure document container via the managed browser, the computing device may, for instance, cause the managed browser to display and/or otherwise present one or more user interfaces that are configured to allow the enterprise data and/or other information stored in the secure document container to be viewed, edited, and/or otherwise accessed. For instance, instep925, the computing device may cause the managed browser to display and/or otherwise present one or more user interfaces that allow a user of the computing device to browse the information stored in the secure document container, view particular files and/or other information stored in the secure document container, edit the information stored in the secure document container, delete the information stored in the secure document container, and/or otherwise interact with and/or access the information that is stored in the secure document container.
Instep930, data may be selectively wiped from the secure document container. For example, instep930, the computing device may selectively wipe and/or otherwise delete information from the secure document container. In one or more arrangements, the computing device may selectively wipe data from the secure document container based on device state information, one or more policies, and/or other factors and/or circumstances that may be evaluated and/or detected by the computing device and/or by an MRM agent running on the computing device. In some instances, the computing device may wipe some data from the secure document container, such as the enterprise data obtained instep915, while leaving other data, such as other data, including other enterprise data, which may be stored in the secure document container. In other instances, the computing device may wipe data from the secure document container that was received and/or stored during a certain time period (e.g., within the last four hours) while leaving other data (e.g., data that was received and/or stored during a different time period). In still other instances, the computing device may wipe data from the secure document container that was received and/or stored in connection with the managed browser and/or a particular session of the managed browser, while leaving other data (e.g., data that is associated with other applications and/or other session(s) of the managed browser).
In some embodiments, selectively wiping data from the secure document container may include deleting the enterprise data obtained from the one or more enterprise resources based on the request. For example, in selectively wiping data from the secure document container (e.g., in step930), the computing device may delete the enterprise data obtained from the enterprise resource(s) instep915. In deleting this enterprise data, the computing device may, for instance, delete the enterprise data obtained during the particular browsing session(s) in which the enterprise data was obtained, as well as any other information that may have been obtained during these browsing session(s), while leaving and/or otherwise preserving other data that may be stored in the secure document container (which, e.g., may have been obtained during other browsing session(s), may be associated with other application(s), etc.).
In some embodiments, data may be selectively wiped from the secure document container when the managed browser is closed. For example, the computing device may, in some instances, selectively wipe data from the secure document container in response to and/or otherwise based on the managed browser being closed (e.g., when a user of the computing device closes the managed browser, when a user of the computing devices closes a tab of the managed browser and/or otherwise closes a particular session of the managed browser, when the managed browser is closed or caused to be closed by another application, service, or process on the computing device, such as an MRM agent running on the computing device, etc.).
In some embodiments, data may be selectively wiped from the secure document container based on one or more policies. For example, the computing device may, in some instances, selectively wipe data from the secure document container based on one or more mobile device management policies. For instance, one or more mobile device management policies may define certain circumstances in which certain type(s) of data are to be selectively wiped from the secure document container, and the computing device and/or an MRM agent running on the computing device may detect these circumstances based on device state information and subsequently wipe data from the secure document container in accordance with the policies. For example, based on device state information (which may, e.g., include information identifying one or more applications that are present on the computing device, information identifying one or more network connections that are used by the computing device, and/or information identifying a current location of the computing device), the computing device and/or an MRM agent running on the computing device may selectively wipe enterprise data from the secure document container that was obtained from one or more enterprise resources using the managed browser (e.g., in step915) and subsequently stored in the secure document container (e.g., in step920).
In some embodiments, data may be selectively wiped from the secure document container based on the one or more policies that are applied to the managed browser when the managed browser is operating in the managed mode. For example, the computing device may, in some instances, selectively wipe data from the secure document container based on the one or more policies that are applied to the managed browser in the managed mode, and at least one such policy may define specific circumstances in which specific data (which may, e.g., have been obtained using the managed browser) should be selectively deleted from the secure document container. In addition, these specific circumstances may be detected by the computing device and/or by an MRM agent running on the computing device based on device state information, as in the examples discussed above.
FIG. 10 depicts a flowchart that illustrates a method of obtaining enterprise data based on a single sign-on credential and providing access to the data via a managed browser in accordance with one or more illustrative aspects discussed herein. In one or more embodiments, the method illustrated inFIG. 10 and/or one or more steps thereof may be performed by a computing device (e.g., generic computing device201). In other embodiments, the method illustrated inFIG. 10 and/or one or more steps thereof may be embodied in computer-executable instructions that are stored in a computer-readable medium, such as a non-transitory computer-readable memory.
As seen inFIG. 10, the method may begin atstep1005 in which a managed browser may be loaded. For example, instep1005, a computing device (e.g., a mobile computing device, such as a laptop computer, tablet computer, smart phone, or other type of mobile device) may load a managed browser, similar to how such a managed browser may be loaded in step505 (discussed above). The managed browser may, for instance, be configured to provide at least one managed mode in which one or more policies are applied to the managed browser, and the one or more policies may be configured to limit one or more functions of the managed browser, as discussed above. Additionally, the managed browser may, in some embodiments, be configured to provide secure browsing and caching of data obtained from at least one enterprise resource.
Instep1010, a single sign-on (SSO) credential that is associated with at least one user account may be received. For example, instep1010, the computing device may receive a single sign-on credential, and the single sign-on credential may be linked to and/or otherwise associated with a particular user of the computing device and/or a particular user account (which may, e.g., be utilized in accessing and/or using the computing device and/or other resources, such as enterprise resources and/or other network resources). In one or more arrangements, the single sign-on credential may be an authentication credential that is configured to be used in accessing at least two different enterprise resources (e.g., various enterprise websites, databases, servers, other resources, etc.). Additionally or alternatively, the single sign-on credential may be received when the user is logging into a user account on the computing device, logging into an application on the computing device, logging into a website being accessed via the computing device, interacting with an authentication prompt presented on the computing device, and/or in other ways. In some instances, the single sign-on credential may be received via the managed browser, for example, in connection with a request or attempt to access one or more enterprise resources and/or other resources or information using the managed browser.
Instep1015, enterprise data from one or more enterprise resources may be obtained based on the SSO credential. For example, instep1015, the computing device may connect to, request, and subsequently receive and/or otherwise obtain information from one or more enterprise resources using the SSO credential received instep1010. In some instances, the SSO credential may, for instance, be used in authenticating with the enterprise resources, requesting rights-controlled information from the enterprise resources, and/or otherwise receiving the enterprise data from the enterprise resources. For example, in obtaining enterprise data from one or more enterprise resources, the computing device may initiate a connection to a specific enterprise resource, which may challenge the managed browser to provide authentication information. In response to the challenge, the managed browser may provide the SSO credential (e.g., as received in step1010) to the enterprise resource in order to authenticate with the enterprise resource and/or obtain information from the enterprise resource.
Instep1020, access to the obtained enterprise data may be provided via the managed browser. For example, instep1020, the computing device may provide access to the enterprise data obtained instep1015 via the managed browser. In providing access to the obtained enterprise data via the managed browser, the computing device may, for instance, cause the managed browser to display and/or otherwise present one or more user interfaces that are configured to allow the enterprise data to be viewed, edited, and/or otherwise accessed. For instance, instep920, the computing device may cause the managed browser to display and/or otherwise present one or more user interfaces that allow a user of the computing device to browse the obtained enterprise data, view the obtained enterprise data, edit the obtained enterprise data, delete the obtained enterprise data, and/or otherwise interact with and/or access the obtained enterprise data.
In some embodiments, in obtaining enterprise data from the one or more enterprise resources based on the SSO credential, the computing device and/or the managed browser running on the computing device may, depending on one or more policies and/or device state information, respond to one or more authentication challenges (which may, e.g., be presented by one or more enterprise resources) using the SSO credential without user involvement. For instance, such an authentication challenge may be automatically addressed by the managed browser and/or the computing device using the SSO credential based on one or more policies and/or device state information. In addition, the specific authentication challenges and/or types of authentication challenges that may be automatically addressed in this manner may change depending on the one or more policies and/or the current context of the device (which may, e.g., be indicated by device state information, as in the examples discussed above).
Thus, in one or more embodiments, obtaining the enterprise data from the one or more enterprise resources based on the SSO credential (e.g., in step1015) may include: receiving an authentication challenge from at least one enterprise resource of the one or more enterprise resources; determining, based on at least one policy of the one or more policies, whether to provide the SSO credential to the at least one enterprise resource in response to the authentication challenge; and based on determining to provide the SSO credential to the at least one enterprise resource in response to the authentication challenge, providing the SSO credential to the at least one enterprise resource. For example, in obtaining enterprise data from one or more enterprise resources using the SSO credential (e.g., in step1015), the computing device and/or the managed browser running on the computing device may receive an authentication challenge from an enterprise resource (which the managed browser may, e.g., be attempting to access). Such an authentication challenge may, for instance, typically require a user to provide one or more authentication credentials in order to access the corresponding resource.
After receiving the authentication challenge, the computing device and/or the managed browser running on the computing device may determine, based on one or more policies, whether to provide the SSO credential to the enterprise resource to respond to the authentication challenge. For instance, the computing device and/or the managed browser may such a determination on one or more policies that define specific circumstances in which the managed browser can automatically respond to such an authentication challenge using the SSO credential. In addition, the computing device and/or the managed browser may evaluate these circumstances based on device state information, similar to how such device state information may be evaluated in the examples discussed above. If the computing device and/or the managed browser determines, in view of the one or more policies and/or the device state information, that the SSO credential can be provided to the enterprise resource to respond to the authentication challenge, then the computing device and/or the managed browser may provide the SSO credential to the enterprise resource. For instance, the computing device and/or the managed browser may send the SSO credential (which may, e.g., have been received in step1010) to the enterprise resource in order to automatically respond to the authentication challenge, which in turn may enable the computing device and/or the managed browser to access information from and/or stored by the enterprise resource. In addition, the computing device and/or the managed browser may send the SSO credential in this way without user involvement. For example, the computing device and/or the managed browser may send the SSO credential without prompting the user to provide any authentication credentials and/or without even notifying the user that the SSO credential is being provided to the enterprise resource. Alternatively, if the computing device and/or the managed browser determines, in view of the one or more policies and/or the device state information, that the SSO credential cannot be provided to the enterprise resource to respond to the authentication challenge, then the computing device and/or the managed browser may prompt the user to provide one or more authentication credentials (which may then, e.g., be used by the computing device and/or the managed browser in responding to the authentication challenge). Thus, in one or more embodiments, based on determining not to provide the SSO credential to the at least one enterprise resource in response to the authentication challenge, the computing device and/or the managed browser running on the computing device may generate an authentication prompt that is configured to receive at least one authentication credential from a user of the computing device.
In some embodiments, providing access to the obtained enterprise data via the managed browser may include enforcing one or more policies based on the SSO credential. For example, in providing access to the obtained enterprise data and/or enforcing policies based on the SSO credential, the computing device may obtain one or more policies based on the SSO credential (e.g., by downloading, receiving, and/or otherwise obtaining one or more policies from a policy server and/or other enterprise resources based on the SSO credential), select applicable policies based on the SSO credential (e.g., by selectively activating, deactivating, and/or enforcing policies that are applicable to and/or appropriate for the current user of the computing device, in view of the identity information that may be associated with the SSO credential), and/or impose one or more behavior limitations on the managed browser in accordance with the policies (e.g., by enforcing behavior limitations on the managed browser that may be applicable to and/or appropriate for the identity and/or role of the user in view of the SSO credential, the one or more policies, and/or device state information).
In some embodiments in which one or more policies are enforced based on the SSO credential, the one or more policies may be configured to limit one or more functions of the managed browser. For example, the one or more policies may define certain circumstances in which certain function(s) of the managed browser are to be selectively disabled for certain users, and the computing device may detect and/or otherwise identify these circumstances (e.g., based on device state information) and subsequently disable the function(s) in accordance with the one or more policies and based on the SSO credential received instep1010. As discussed above, some examples of the functions of the managed browser that may be limited by a policy in some instances include cut-and-paste functions, instant messaging functions, and video chat functions. In addition, while these functions are listed here as examples of the functions that may be limited in some instances, other functions may be similarly limited in other instances.
In some embodiments in which one or more policies are enforced based on the SSO credential, the one or more policies may be configured to limit access to the obtained enterprise data. For example, the one or more policies may define certain circumstances in which the enterprise data (e.g., the enterprise data obtained in step1015) can only be accessed and/or used in certain ways, and the computing device may detect and/or otherwise identify these circumstances (e.g., based on device state information) and subsequently restrict and/or otherwise control the way(s) in which the data can be accessed and/or used in accordance with the one or more policies and based on the SSO credential received instep1010. For instance, at least one policy of the one or more policies may be configured to limit the circumstances in which the obtained enterprise data can be copied and pasted (e.g., from the managed browser into another application). As another example, at least one policy of the one or more policies may be configured to limit the circumstances in which the obtained enterprise data can be saved or printed (e.g., by the managed browser and/or by the computing device).
In some embodiments in which one or more policies are enforced based on the SSO credential, enforcement of at least one policy of the one or more policies may depend on device state information. For example, the limit(s) on the function(s) of the managed browser (e.g., as imposed by the one or more policies) and/or the limit(s) on the way(s) in which enterprise data may be accessed and/or used by the managed browser (e.g., as additionally or alternatively imposed by the one or more policies) may be depend on state information that is indicative of the current state of the computing device. Such state information may, for instance, be collected and/or monitored by an MRM agent, as in the examples discussed above, that is configured to run on the computing device (e.g., as a background application, service, or process). For example, the MRM agent may be configured to collect and/or monitor device-level state information, such as state information that is indicative of the operating systems and/or applications that are stored on and/or running on the device, state information that is indicative of the network connections that are available to and/or being used by the device, and/or state information that is indicative of the current location of where the device is located and/or being used. In addition, any and/or all of this state information may be used (e.g., by the computing device and/or by the managed browser) in applying and/or enforcing policies on the managed browser, such as the policies discussed above, in combination with the SSO credential (which may, e.g., be received instep1010, as discussed above).
FIG. 11 depicts a flowchart that illustrates a method of providing access to an application store via a managed browser in accordance with one or more illustrative aspects discussed herein. In one or more embodiments, the method illustrated inFIG. 11 and/or one or more steps thereof may be performed by a computing device (e.g., generic computing device201). In other embodiments, the method illustrated inFIG. 11 and/or one or more steps thereof may be embodied in computer-executable instructions that are stored in a computer-readable medium, such as a non-transitory computer-readable memory.
As seen inFIG. 11, the method may begin atstep1105 in which a managed browser may be loaded. For example, instep1105, a computing device (e.g., a mobile computing device, such as a laptop computer, tablet computer, smart phone, or other type of mobile device) may load a managed browser, similar to how such a managed browser may be loaded in step505 (discussed above). The managed browser may, for instance, be configured to provide at least one managed mode in which one or more policies are applied to the managed browser, and the one or more policies may be configured to limit one or more functions of the managed browser, as discussed above. Additionally, the managed browser may, in some embodiments, be configured to provide secure browsing and caching of data obtained from at least one enterprise resource.
Instep1110, a request to access an application store via the managed browser may be received. For example, instep1110, the computing device may receive a request to access an application store via the managed browser. Such a request may, for instance, be based on and/or correspond to user input received by the computing device via the managed browser (e.g., based on a user selecting a link and/or otherwise requesting access to an application store using the managed browser). For example, the managed browser may include an icon or toolbar that may be configured to cause the application store to be displayed within the managed browser upon selection of the icon or toolbar. Additionally or alternatively, a specific policy that is applied to the managed browser may dynamically direct the browser to the correct application store based on one or more factors, such as the context (e.g., the state of the browser and/or various other programs that may be running on the device), user account information, and/or user role information.
In one or more arrangements, the application store (which, e.g., is requested to be accessed in step1110) may be an enterprise application store that is configured to provide enterprise applications to one or more mobile computing devices. In addition to being configured to provide enterprise applications to various devices, the enterprise application store also may be configured to provide one or more mobile device management policies and/or policy updates to various devices. For instance, the application store may be configured to provide one or more applications that can be downloaded by one or more mobile computing devices and/or other user devices and that can subsequently be run natively on such user devices. The application store also may provide information that can be used to access one or more web applications and/or one or more virtualized applications. For example, the application store may provide a pointer and/or location information that can be used by the managed browser to locate and/or connect to a server that is running and/or otherwise configured to provide such a web application or virtualized application. In some instances, the pointer and/or location information may also be passed by the managed browser to a different application on the computing device to execute the web application or the virtualized application.
Instep1115, enterprise data from the application store may be obtained based on the request. For example, instep1115, the computing device may connect to, request, and subsequently receive and/or otherwise obtain information from the application store based on the request received instep1110.
Instep1120, at least part of the obtained enterprise data may be presented via the managed browser. For example, instep1120, the computing device may present, via the managed browser, at least part of the enterprise data obtained from the application store instep1115. In presenting the enterprise data via the managed browser, the computing device may, for instance, cause the managed browser to display and/or otherwise present one or more user interfaces that are configured to allow the enterprise data obtained from the application store to be viewed, interacted with, and/or otherwise accessed. For instance, instep1120, the computing device may cause the managed browser to display and/or otherwise present one or more user interfaces that allow a user to view applications and/or other content available in the application store, select and/or download such applications and/or other content, and/or otherwise interact with application store data.
In some embodiments, presenting at least part of the obtained enterprise data may include causing an application download interface to be provided via the managed browser. For example, in presenting at least part of the enterprise data obtained from the application store, the computing device may display and/or cause the managed browser to display and/or otherwise present an application download interface. The application download interface may, for instance, include information about one or more applications that may be available for download via the application store and/or may include one or more links and/or other controls that are selectable to download the available application(s).
In some embodiments, presenting at least part of the obtained enterprise data may include providing access to at least one application from the application store, where the at least one application is only accessible via the managed browser. For example, in presenting at least part of the enterprise data obtained from the application store, the computing device may provide access to an application in the application store that is only available (e.g., for access, download, etc.) when the application store is accessed with the managed browser (e.g., and not with a conventional and/or non-managed browser). In some instances, certain types of information associated with a specific application (which may, e.g., be available in the application store and/or may have been obtained from the application store) might only be provided to a user device when the user device is accessing the application store via the managed browser. For example, access to enterprise templates, specific data sets, co-worker reviews, information about specific projects for which the application has been used, lists of other users and/or employees that have downloaded the application, and/or other types of information associated with a specific application might only be provided via the managed browser. This information may, for instance, be considered enterprise specific, and thus access to the information may be restricted through use of the managed browser.
In some embodiments, presenting at least part of the obtained enterprise data may include causing a virtualized session of at least one application to be provided via the managed browser. For example, in presenting at least part of the enterprise data obtained from the application store, the computing device may cause a virtualized session of an application to be provided via the managed browser. For instance, the computing device may cause the managed browser to display and/or otherwise provide one or more virtualized user interfaces of the application, which may be obtained from and/or remotely executed by the application store and/or one or more enterprise resources.
In some embodiments, the managed browser may be further configured to monitor device state information and enforce one or more policies based on the device state information. For example, in addition to being configured to present enterprise data obtained from the application store, the managed browser may be further configured to monitor device state information and enforce one or more policies (e.g., on the managed browser itself and/or on one or more other applications that may be running on the device). For instance, the managed browser may be configured to operate as and/or provide functionalities similar to the MRM agent discussed above, such that the managed browser may operate on the computing device not only as a browser that can securely access enterprise resources, but also as a mobile resource management agent that can monitor device state information and enforce policies on various applications and/or other functions of the device based on the state information.
FIG. 12 depicts a flowchart that illustrates a method of obtaining and controlling enterprise data with a managed browser in accordance with one or more illustrative aspects discussed herein. In one or more embodiments, the method illustrated inFIG. 12 and/or one or more steps thereof may be performed by a computing device (e.g., generic computing device201). In other embodiments, the method illustrated inFIG. 12 and/or one or more steps thereof may be embodied in computer-executable instructions that are stored in a computer-readable medium, such as a non-transitory computer-readable memory.
As seen inFIG. 12, the method may begin atstep1205 in which a managed browser may be loaded. For example, instep1205, a computing device (e.g., a mobile computing device, such as a laptop computer, tablet computer, smart phone, or other type of mobile device) may load a managed browser, similar to how such a managed browser may be loaded in step505 (discussed above). The managed browser may, for instance, be configured to provide at least one managed mode in which one or more policies are applied to the managed browser, and the one or more policies may be configured to limit one or more functions of the managed browser, as discussed above. Additionally, the managed browser may, in some embodiments, be configured to provide secure browsing and caching of data obtained from at least one enterprise resource.
Instep1210, a request to access one or more enterprise resources via the managed browser may be received. For example, instep1210, the computing device may receive a request to access one or more enterprise resources via the managed browser. Such a request may, for instance, be based on and/or correspond to user input received by the computing device via the managed browser (e.g., based on a user selecting a link and/or otherwise requesting access to a network resource using the managed browser).
Instep1215, enterprise data from the one or more enterprise resources may be obtained based on the request. For example, instep1215, the computing device may connect to, request, and subsequently receive and/or otherwise obtain information from the one or more enterprise resources based on the request received instep1210.
Instep1220, the obtained enterprise data may be controlled based on one or more policies. For example, instep1220, the computing device may control the enterprise data obtained instep1215 using one or more mobile device management policies. The one or more mobile device management policies may, for instance, define certain circumstances in which certain functions (e.g., certain functions of the managed browser, certain functions involving the obtained enterprise data, etc.) may be allowed, prohibited, and/or otherwise restricted. Additionally or alternatively, the computing device may be configured to evaluate these circumstances based on device state information and subsequently control the enterprise data in accordance with the one or more policies. In some instances, the obtained enterprise data may be controlled using the same set of policies (e.g., a first set of policies) that may be applied to the managed browser in the managed mode. In other instances, the obtained enterprise data may be controlling using a different set of policies (e.g., a second set of policies different from the first set of policies) than may be applied to the managed browser in the managed mode.
In some embodiments, the policies that are used in controlling the enterprise data (e.g., in step1220) may be specific to and/or grouped for one or more particular industries, such as healthcare, finance, law, engineering, and so on. By grouping and/or otherwise implementing policies in this manner, a cohesive group of industry-specific policies can be applied to the managed browser to create an industry-specific browser. For example, a cohesive group of healthcare-related policies may be applied to the managed browser to create a “healthcare browser” in which, for instance, the policies may operate to block certain functionality to meet regulatory and/or privacy concerns.
In some embodiments, the policies that are used in controlling the enterprise data (e.g., in step1220) may include one or more policies that allow and/or cause logging functions and/or other monitoring functions to be selectively applied and/or executed. Such logging functions and/or other monitoring functions may be applied to the managed browser and/or to one or more other applications and/or services running on the computing device. For example, one or more policies may monitor and/or selectively filter network traffic during certain times, in certain locations, and/or based on the current context of the device. Additionally or alternatively, one or more policies may monitor and/or selectively filter network traffic based on user role information, performance information (which may, e.g., include device performance and/or network performance), and/or one or more other factors.
In some embodiments, controlling the obtained enterprise data may include controlling the managed browser with a mobile resource management (MRM) agent, such as a mobile resource management (MRM) agent, that is configured to apply at least one policy to at least one other application on the computing device. For example, in addition to being configured to control the managed browser (e.g., by applying and/or enforcing policies on the managed browser), an MRM agent that may be running on the computing device may be further configured to apply various mobile device management policies to other applications that are stored on and/or running on the computing device. Such an MRM agent may, for instance, incorporate one or more aspects of client agent404 (discussed above).
In some embodiments, at least one policy of the one or more policies may be configured to selectively disable one or more functions of the managed browser based on device state information. Some examples of the functions of the managed browser that may be selectively disabled by such a policy in some instances include cut-and-paste functions, instant messaging functions, and video chat functions. While these functions are listed here as examples of the functions that may be selectively disabled in some instances, other functions may be similarly disabled in other instances. In addition, the device state information that may be used in evaluating the one or more policies may include information identifying one or more applications that are present on the computing device, information identifying one or more network connections that are used by the computing device, and/or information identifying a current location of the computing device, as in the examples discussed above.
In some embodiments, controlling the obtained enterprise data based on one or more policies may include controlling access to the obtained enterprise data. In addition, controlling access to the obtained enterprise data may, in some instances, include controlling use of the obtained enterprise data. For example, the one or more policies may define certain circumstances in which the enterprise data (e.g., the enterprise data obtained using the managed browser in step1215) can only be accessed and/or used in certain ways, and the computing device may detect and/or otherwise identify these circumstances (e.g., based on device state information) and subsequently restrict and/or otherwise control the way(s) in which the data can be accessed and/or used in accordance with the one or more policies. For instance, at least one policy of the one or more policies may be configured to limit the circumstances in which the obtained enterprise data can be copied and pasted (e.g., from the managed browser into another application). As another example, at least one policy of the one or more policies may be configured to limit the circumstances in which the obtained enterprise data can be saved or printed (e.g., by the managed browser and/or by the computing device).
In some embodiments, the managed browser may be configured to receive one or more policy updates for the MRM agent from a policy management server. For example, the managed browser may, in some instances, receive one or more policy updates (which may, e.g., include new and/or updated policies to be applied to the managed browser, other applications, and/or other aspects of the computing device). Such policy updates may, for instance, be received from a policy management server, and after receiving such a policy update, the managed browser may provide the policy update and its associated information to the MRM agent (which may, e.g., then receive and apply the new and/or updated policies as appropriate).
In some embodiments, controlling the obtained enterprise data may include selectively blocking access to the obtained enterprise data when the managed browser is operating in an unmanaged mode. For example, after obtaining enterprise data from one or more enterprise resources (e.g., in step1215), the managed browser and/or the computing device on which the managed browser is running may selectively block access to the obtained enterprise data when the managed browser is operating in an unmanaged mode (in which, e.g., one or more policies might not be applied to the browser, as discussed in the examples above). In other words, the managed browser and/or the computing device on which the managed browser is running may be configured such that a user of the computing device might only be able to access the obtained enterprise data with the managed browser while the managed browser is running in the managed mode, and may be prevented from accessing the obtained enterprise data via the managed browser while the managed browser is not running in the managed mode (e.g., when the managed browser is running in the unmanaged mode).
FIG. 13 depicts a flowchart that illustrates a method of administering one or more policies for a managed browser in accordance with one or more illustrative aspects discussed herein. In one or more embodiments, the method illustrated inFIG. 13 and/or one or more steps thereof may be performed by a computing device (e.g., generic computing device201). In other embodiments, the method illustrated inFIG. 13 and/or one or more steps thereof may be embodied in computer-executable instructions that are stored in a computer-readable medium, such as a non-transitory computer-readable memory.
As seen inFIG. 13, the method may begin atstep1305 in which at least one policy to be applied to a managed browser on one or more user computing devices may be received. For example, such a policy may be received by a server computing device (which may, e.g., incorporate one or more aspects ofgeneric computing device201 and/or may be configured to provide policy management functionalities for an enterprise organization and/or its various users). In addition, the policy may be received by the server computing device from an administrative user and/or from a computing device being operated by such a user, who may be defining one or more new and/or updated policies to be applied to the managed browser(s) on various user computing devices. As in the examples discussed above, the managed browser may, for instance, be configured to provide at least one managed mode in which one or more policies are applied to the managed browser, and the one or more policies may be configured to limit one or more functions of the managed browser. Additionally, the managed browser may, in some embodiments, be configured to provide secure browsing and caching of data obtained from at least one enterprise resource.
Instep1310, at least one policy update may be provided to at least one user computing device of the one or more user computing devices based on the at least one policy. For example, in step1315, the server computing device may provide a policy update to a user computing device based on the policy received instep1305. In providing the policy update to a user computing device, the server computing device may, for instance, connect to, push, and/or otherwise send information to the user computing device about the new and/or updated policy, which may have been received by the server computing device instep1305.
In one or more arrangements, the at least one policy update may be configured to cause the at least one user computing device to apply the at least one received policy to a managed browser on the at least one user computing device. For example, the policy update (which may, e.g., be provided by the server computing device to a user computing device in step1310) may be configured to cause the user computing device to apply the policy (which may, e.g., be received by the server computing device in step1305) to a managed browser on the user computing device. Such a managed browser may, for example, be running, stored, and/or otherwise present on the user computing device that receives the policy update from the server computing device (e.g., in step1310). In some arrangements, the policy (which may, e.g., be received instep1305 by the server computing device, and subsequently provided to and received by the user computing device via the policy update in step1310) may define one or more specific rules that may be enforced on the managed browser and/or on the user computing device running the managed browser. Such rules may, for instance, be enforced in specific circumstances that may be defined in terms of and/or evaluated based on device state information (which may, e.g., include information about what other applications are running, installed on, and/or otherwise present on the user computing device; where the user computing device is located; what networks the user computing device is connected to; etc.)
In some embodiments, the at least one received policy may include one or more content filtering rules. For example, in some instances, the policy received by the server computing device instep1305 may include one or more content filtering rules. Such a content filtering rule may, for instance, control a managed browser's ability to access specific network resources, which may include specific enterprise resources. For example, a content filtering rule may selectively block and/or selectively allow access to specific types of content by the managed browser based on device state information (which may, e.g., include information about what other applications are running, installed on, and/or otherwise present on the user computing device; where the user computing device is located; what networks the user computing device is connected to; etc., as discussed above) and/or other specific criteria.
In some embodiments, the at least one received policy may include one or more caching rules. For example, in some instances, the policy received by the server computing device instep1305 may include one or more content caching rules. Such a content caching rule may, for instance, control a managed browser's ability to cache specific types of content, which may include specific types of content received from one or more enterprise resources, specific types of content received from other network resources (e.g., web content, cookies, etc.), and/or other types of information. For example, a content caching rule may selectively block and/or selectively allow caching of specific types of content by the managed browser based on device state information (which may, e.g., include information about what other applications are running, installed on, and/or otherwise present on the user computing device; where the user computing device is located; what networks the user computing device is connected to; etc., as discussed above) and/or other specific criteria.
In some embodiments, the at least one received policy may include one or more plugin rules. For example, in some instances, the policy received by the server computing device instep1305 may include one or more plug-in management rules. Such a plug-in management rule may, for instance, control a managed browser's ability to access, execute, and/or otherwise use specific plug-ins (which may, e.g., include various types of applications, extensions, applets, scripts, and/or other types of plug-ins). For example, a plug-in management rule may selectively prevent and/or selectively enable access, execution, and/or use of one or more specific plug-ins by the managed browser based on device state information (which may, e.g., include information about what other applications are running, installed on, and/or otherwise present on the user computing device; where the user computing device is located; what networks the user computing device is connected to; etc., as discussed above) and/or other specific criteria.
In some embodiments, the at least one received policy may include one or more credential management rules. For example, in some instances, the policy received by the server computing device instep1305 may include one or more credential management rules. Such a credential management rule may, for instance, control a managed browser's ability to use specific credentials, which may include one or more single sign-on (SSO) credentials, for instance, in accessing one or more resources. For example, a credential management rule may selectively prevent and/or enable access to and/or use of one or more specific credentials by the managed browser based on device state information (which may, e.g., include information about what other applications are running, installed on, and/or otherwise present on the user computing device; where the user computing device is located; what networks the user computing device is connected to; etc., as discussed above) and/or other specific criteria.
In some embodiments, the at least one received policy may be configured to be enforced by the at least one user computing device based on device state information. For example, in some instances, the policy received by the server computing device instep1305 may be configured to be enforced by a user computing device based on device state information associated with the user computing device. Such a policy may, for instance, cause one or more specific functions to be executed and/or prevent one or more other specific functions from being executed based on state information associated with the user computing device. As discussed above, such state information may, for example, include information about what other applications (e.g., besides the managed browser) may be running, installed on, and/or otherwise present on the user computing device, information about where the user computing device is located, information about what networks the user computing device is connected to, and/or other information.
In some embodiments, the at least one received policy may include one or more rules that are configured to cause the managed browser to switch to an unmanaged mode based on one or more criteria. For example, in some instances, the policy received by the server computing device instep1305 may include one or more rules that are configured to cause a managed browser on a user computing device to switch from a managed mode to an unmanaged mode based on one or more criteria. The one or more criteria may, for example, be based on and/or include device state information associated with the user computing device. As discussed above, such state information may, for example, include information about what other applications (e.g., besides the managed browser) may be running, installed on, and/or otherwise present on the user computing device, information about where the user computing device is located, information about what networks the user computing device is connected to, and/or other information.
FIG. 14 depicts a flowchart that illustrates another method of providing access to an application store via a managed browser in accordance with one or more illustrative aspects discussed herein. In one or more embodiments, the method illustrated inFIG. 14 and/or one or more steps thereof may be performed by a computing device (e.g., generic computing device201). In other embodiments, the method illustrated inFIG. 14 and/or one or more steps thereof may be embodied in computer-executable instructions that are stored in a computer-readable medium, such as a non-transitory computer-readable memory.
As seen inFIG. 14, the method may begin atstep1405 in which a request from a managed browser on a user computing device may be received, at an application store, to access a first portion of the application store. For example, instep1405, a computing device that may provide an application store and/or be configured an application store, such as a server computing device that is configured to provide an enterprise application store, may receive a request from a managed browser on a user computing device to access a specific portion of the application store, such as a portion of the application store associated with specific applications and/or specific types of applications.
Instep1410, it may be determined, by the application store, whether the managed browser is operating in a managed mode in which one or more policies are applied to the managed browser, where the one or more policies being configured to limit at least one function of the managed browser. For example, instep1410, the computing device may determine whether the managed browser running on the user computing device is running in a managed mode. For instance, the managed browser on the user computing device may provide and/or have a managed mode, similar to the managed mode(s) of the managed browser discussed in the examples above, for example, in which one or more policies are applied to the managed browser. In addition, the application store may determine whether the managed browser is operating in the managed mode by interrogating and/or otherwise exchanging information (which may, e.g., include device state information associated with the user computing device) with the managed browser to determine its current operating mode.
If it is determined, instep1410, that the managed browser is operating in the managed mode, then in step1415, the application store may allow the managed browser to access the first portion of the application store. For example, in step1415, the computing device may provide the managed browser with access to the first portion of the application store (which may, e.g., include providing information associated with the first portion of the application, such as information associated with specific applications and/or specific types of applications, to the managed browser). In this way, the managed browser on the user computing device can access specific portions of the application store, such as the first portion of the application store in this example, while it is running in a managed mode, and as illustrated below, the managed browser might not be able to access specific portions of the application store when it is not running in a managed mode (e.g., when the browser is running in an unmanaged mode).
Thus, if it is determined, instep1410, that the managed browser is not operating in the managed mode, then instep1420, the application store may prevent the managed browser from accessing the first portion of the application store. For example, instep1420, the computing device may prevent and/or block the managed browser (and/or the user computing device on which the managed browser is running) from accessing and/or otherwise obtaining information from the first portion of the application store.
Additionally or alternatively, instep1425, the application store may provide the managed browser with access to a second portion of the application store different from the first portion of the application store. For example, after determining that the managed browser is not operating in the managed mode (e.g., in step1410), the application store may, instep1425, provide the managed browser with access to a different portion of the application store (e.g., than the portion that may have been originally requested by the managed browser and/or by the user of the managed browser).
Additionally or alternatively, instep1430, the application store may send a command to the managed browser, and the command may be configured to cause the managed browser to enter a managed mode. For example, after determining that the managed browser is not operating in the managed mode (e.g., in step1410), the application store may, instep1430, send such a command to the managed browser. In sending such a command, the computing device providing the application store may, for instance, send and/or exchange data with the user computing device on which the managed browser is running. In addition, although the application store might send such a command, the managed browser on the user computing device might not enter the managed mode if, for instance, one or more policies and/or current device state information for the user computing device prevent the managed browser from entering the managed mode.
Thus, instep1435, the application store may reevaluate whether the managed browser is operating in the managed mode after sending the command to the managed browser. For example, instep1435, the application store may again interrogate and/or otherwise exchange information with the user computing device and/or the managed browser running on the user computing device, which may include obtaining and/or analyzing device state information from the user computing device.
If after the reevaluating instep1435, it is determined that the managed browser is operating in the managed mode, then instep1440, the application store may allow the managed browser to access the first portion of the application store. For example, instep1440, the computing device may provide the managed browser with access to the first portion of the application store, similar to how the application store may provide such access in step1415. Alternatively, if after the reevaluating instep1435, it is determined that the managed browser is still not operating in the managed mode, then instep1445, the application store may generate and/or send a notification to the managed browser, and such a notification may indicate that access to the first portion of the application store cannot be provided while the managed browser is not running in the managed mode. For example, instep1445, the application store may send such a notification to the managed browser in hopes that the user of the managed browser may manually switch the managed browser into the managed mode and/or take other actions, which may alter the device state information and/or compliance with one or more policies, to allow the managed browser to enter the managed mode. Such actions may, for instance, include closing and/or deleting specific applications that may be on the user computing device besides the managed browser, moving the user computing device to another location different from the location at which the device is currently located, and/or connecting the user computing device to one or more other networks than the current network(s) to which the device may be currently connected.
FIG. 15 depicts a flowchart that illustrates a method of providing a managed execution environment within a managed browser in accordance with one or more illustrative aspects discussed herein. In one or more embodiments, the method illustrated inFIG. 14 and/or one or more steps thereof may be performed by a computing device (e.g., generic computing device201). In other embodiments, the method illustrated inFIG. 14 and/or one or more steps thereof may be embodied in computer-executable instructions that are stored in a computer-readable medium, such as a non-transitory computer-readable memory.
As seen inFIG. 15, the method may begin atstep1505 in which a managed browser may be loaded. For example, instep1505, a computing device (e.g., a mobile computing device, such as a laptop computer, tablet computer, smart phone, or other type of mobile device) may load a managed browser, similar to how such a managed browser may be loaded in step505 (discussed above). The managed browser may, for instance, be configured to provide at least one managed mode in which one or more policies are applied to the managed browser, and the one or more policies may be configured to limit one or more functions of the managed browser, as discussed above. Additionally, the managed browser may, in some embodiments, be configured to provide secure browsing and caching of data obtained from at least one enterprise resource.
Instep1510, a managed execution environment may be provided within the managed browser. The managed execution environment may be configured to facilitate execution of one or more web applications, and the managed execution environment may be further configured to apply at least one policy of the one or more policies to the one or more web applications. For example, instep1510, the computing device may provide a managed execution environment within the managed browser. The managed execution environment may, for instance, operate as a shell in which one or more web applications may be executed. The web applications that may be executed in the managed execution environment may, for instance, be written in and/or otherwise utilize various different programming languages (which may, e.g., be interpreted when executed by the computing device at runtime within the managed execution environment). Additionally or alternatively, one or more policies may be applied to web applications that are executed within the managed execution environment, and the one or more policies may be defined and/or imposed by the computing device, an MRM agent running on the computing device, the managed browser, and/or the managed execution environment itself. The policies that are applied to web applications within the managed execution environment may be similar to the policies discussed in the examples above and may, for instance, be enforced based on and/or otherwise depend on device state information (which may, e.g., include device state information for the computing device providing the managed execution environment).
In some embodiments, the managed execution environment may be configured to facilitate execution of at least one HTML5 (HyperText Markup Language 5) application. For example, in some instances, at least one web application of the one or more web applications that can be executed within the managed execution environment may be an HTML5 application that is, for instance, coded in HTML5 markup language.
In some embodiments, at least one policy of the one or more policies may be received from a policy management server. For example, in some instances, the one or more policies that may be applied to a web application in the managed execution environment may be received from a policy management server. Such a policy management server may, for instance, communicate directly with the managed execution environment on the computing device and/or with the managed browser and/or an MRM agent running on the computing device to provide new and/or updated policies to be applied to various web applications that may be executed in the managed execution environment within the managed browser.
In some embodiments, at least one policy (which may, e.g., be applied to the one or more web applications in the managed execution environment) may be configured to prevent the one or more web applications from accessing at least one local storage resource. For example, based on one or more policies that may be applied by the managed execution environment and/or based on device state information (which may, e.g., affect how specific policies are enforced, as in the examples discussed above), the managed execution environment and/or the computing device that is providing the managed execution environment within the managed browser may prevent one or more web applications in the managed execution environment from storing data in one or more local resources on the computing device. Additionally or alternatively, based on one or more policies that may be applied by the managed execution environment and/or based on device state information, the managed execution environment and/or the computing device that is providing the managed execution environment within the managed browser may prevent one or more web applications in the managed execution environment from accessing locally stored data (which may, e.g., be stored in one or more local resources on the computing device).
In some embodiments, at least one policy (which may, e.g., be applied to the one or more web applications in the managed execution environment) may be configured to selectively enable the one or more web applications to access at least one local storage. For example, based on one or more policies that may be applied by the managed execution environment and/or based on device state information (which may, e.g., affect how specific policies are enforced, as in the examples discussed above), the managed execution environment and/or the computing device that is providing the managed execution environment within the managed browser may allow one or more specific web applications in the managed execution environment to access data in one or more local resources on the computing device. Additionally or alternatively, based on one or more policies that may be applied by the managed execution environment and/or based on device state information, the managed execution environment and/or the computing device that is providing the managed execution environment within the managed browser may allow one or more specific web applications in the managed execution environment to store and/or modify data in one or more local resources on the computing device. In some instances, such a policy may additionally or alternatively require the one or more web applications to utilize one or more encryption functions (e.g., to encrypt data being accessed from and/or stored in the local resources) in instances in which the one or more web applications are interacting with local storage resources.
In some embodiments, the managed execution environment may be configured to expose a policy management agent on the computing device to the one or more web applications. For example, the managed execution environment and/or the computing device providing the managed execution environment within the managed browser may, in some instances, expose a policy management agent (which may, e.g., be an MRM agent, as discussed in the examples above) that is running on the computing device to the one or more web applications that may be executed in the managed execution environment. By exposing the policy management agent to the web applications in this manner, the managed execution environment may be able to extend policy management functionalities, secure key management functionalities, and/or other functionalities to the managed execution environment and/or the web applications in the managed execution environment.
In some embodiments, the managed execution environment may be configured to expose one or more functions to the one or more web applications via an application programming interface. For example, the managed execution environment and/or the computing device providing the managed execution environment within the managed browser may, in some instances, expose one or more functions to the one or more web applications via one or more interfaces that may allow such a web application provide higher-level functionalities than might be provided by other web applications. For example, the exposed functions may allow a web application in the managed execution environment to utilize encryption functionalities, secure tunneling functionalities, secure data storage functionalities, policy management functionalities, and/or other functionalities that may, for instance, be provided by other applications and/or services running on the computing device, such as an MRM agent running on the computing device.
In some embodiments, the managed execution environment may be configured to provide an authentication service for the one or more web applications. For example, the managed execution environment and/or the computing device providing the managed execution environment within the managed browser may, in some instances, provide an authentication service for one or more web applications in the managed execution environment. In providing such an authentication service, the managed execution environment and/or the computing device providing the managed execution environment may, for instance, handle multi-factor authentication processes for a web application, which may include obtaining credentials, maintaining keys, and/or providing credentials and/or keys to facilitate various handshakes in specific circumstances. In some instances, by handling such multi-factor authentication processes, the managed execution environment and/or the computing device providing the managed execution environment may enable execution of one or more specific functions within a particular web application and/or enable execution of a web application itself.
In some embodiments, the managed execution environment may be configured to apply a default set of policies to the one or more web applications. For example, the managed execution environment and/or the computing device providing the managed execution environment may, in some instances, a default set of policies or a “policy bundle” to one or more specific web applications in the managed execution environment. The default set of policies may, for instance, be received from and/or periodically updated by a policy management server. In addition, the default set of policies may be applied to a particular web application in the managed execution environment unless a different and/or customized set of policies is defined for the web application.
In some embodiments, the managed execution environment may be configured to dynamically update a set of policies applied to the one or more web applications. For example, the managed execution environment and/or the computing device providing the managed execution environment may, in some instances, dynamically update and/or otherwise modify on-the-fly the policies that are applied to a specific web application in the managed execution environment based on device state information and/or user information (which may, e.g., include user role information) to change, in real-time, the behavior of the managed execution environment based on current usage context of the device. For instance, based on device state information (which may, e.g., include information about what other applications are running, installed on, and/or otherwise present on the user computing device; where the user computing device is located; what networks the user computing device is connected to; etc.), the managed execution environment and/or the computing device providing the managed execution environment may selectively enable and/or selectively disable one or more policies that may be applied to one or more web applications in the managed execution environment. As another example, based on a change in user information (which may, e.g., occur as a result of a user switching accounts and/or as a result of a different user logging into the device), the managed execution environment and/or the computing device providing the managed execution environment may selectively enable and/or selectively disable one or more policies that may be applied to one or more web applications in the managed execution environment. In this manner, the managed execution environment may dynamically adapt to changing conditions that may require different levels of controls to be imposed upon the web applications that are present in and/or being executed in the managed execution environment.
As illustrated above, various aspects of the disclosure relate to providing a managed browser on a mobile computing device. In other embodiments, however, the concepts discussed herein can be implemented in any other type of computing device (e.g., a desktop computer, a server, a console, a set-top box, etc.). Thus, although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are described as some example implementations of the following claims.

Claims (18)

What is claimed is:
1. A method, comprising:
loading, by a computing device, a managed browser, the managed browser being configured to provide at least one managed mode in which one or more policies are applied to the managed browser, the one or more policies being configured to limit at least one function of the managed browser; and
providing, by the computing device, a managed execution environment within the managed browser,
wherein the managed execution environment is configured to facilitate execution of one or more web applications,
wherein the managed execution environment is configured to apply at least one policy of the one or more policies to the one or more web applications, and
wherein the managed execution environment is configured to expose a mobile resource management (MRM) agent on the computing device to the one or more web applications, the MRM agent being configured to monitor state information associated with the computing device and enforce policies based on the state information,
wherein the managed execution environment is configured to expose one or more functions to the one or more web applications via an application programming interface, and
wherein at least one function of the one or more functions exposed to the one or more web applications via the application programming interface includes a secure data storage function.
2. The method ofclaim 1, wherein the managed execution environment is configured to facilitate execution of at least one HTML5 application.
3. The method ofclaim 1, wherein at least one policy of the one or more policies is received from a policy management server.
4. The method ofclaim 1, wherein the at least one policy is configured to prevent the one or more web applications from accessing at least one local storage resource.
5. The method ofclaim 1, wherein the at least one policy is configured to selectively enable the one or more web applications to access at least one local storage.
6. The method ofclaim 1, wherein the managed execution environment is configured to provide an authentication service for the one or more web applications.
7. The method ofclaim 1, wherein the managed execution environment is configured to apply a default set of policies to the one or more web applications.
8. The method ofclaim 1, wherein the managed execution environment is configured to dynamically update a set of policies applied to the one or more web applications.
9. A computing device, comprising:
at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing device to:
load a managed browser, the managed browser being configured to provide at least one managed mode in which one or more policies are applied to the managed browser, the one or more policies being configured to limit at least one function of the managed browser; and
provide a managed execution environment within the managed browser,
wherein the managed execution environment is configured to facilitate execution of one or more web applications,
wherein the managed execution environment is configured to apply at least one policy of the one or more policies to the one or more web applications, and
wherein the managed execution environment is configured to expose a mobile resource management (MRM) agent on the computing device to the one or more web applications, the MRM agent being configured to monitor state information associated with the computing device and enforce policies based on the state information,
wherein the managed execution environment is configured to expose one or more functions to the one or more web applications via an application programming interface, and
wherein at least one function of the one or more functions exposed to the one or more web applications via the application programming interface includes a secure data storage function.
10. The computing device ofclaim 9, wherein the managed execution environment is configured to facilitate execution of at least one HTML5 application.
11. The computing device ofclaim 9, wherein at least one policy of the one or more policies is received from a policy management server that is configured to communicate with the MRM agent to provide policies to be applied to the one or more web applications.
12. The computing device ofclaim 9, wherein the at least one policy is configured to prevent the one or more web applications from accessing at least one local storage resource based on the state information monitored by the MRM agent.
13. The computing device ofclaim 9,
wherein the at least one policy is configured to selectively enable the one or more web applications to access at least one local storage based on the state information monitored by the MRM agent, and
wherein the at least one policy is further configured to require the one or more web applications to utilize an encryption function when interacting with the at least one local storage.
14. The computing device ofclaim 9,
wherein at least one function of the one or more functions exposed to the one or more web applications via the application programming interface includes a secure tunneling function.
15. The computing device ofclaim 9,
wherein the managed execution environment is configured to provide an authentication service for the one or more web applications,
wherein providing the authentication service for the one or more web applications includes handling at least one multi-factor authentication process for at least one web application of the one or more web applications, and
wherein handling the at least one multi-factor authentication process for the at least one web application includes obtaining one or more credentials, maintaining one or more keys, and providing at least one of the one or more credentials and the one or more keys to facilitate at least one handshake.
16. The computing device ofclaim 9, wherein the managed execution environment is configured to apply a default set of policies to the one or more web applications, the default set of policies including a policy bundle for one or more specific web applications of the one or more web applications.
17. One or more non-transitory computer-readable media having instructions stored thereon that, when executed, cause a computing device to:
load a managed browser, the managed browser being configured to provide at least one managed mode in which one or more policies are applied to the managed browser, the one or more policies being configured to limit at least one function of the managed browser; and
provide a managed execution environment within the managed browser,
wherein the managed execution environment is configured to facilitate execution of one or more web applications,
wherein the managed execution environment is configured to apply at least one policy of the one or more policies to the one or more web applications, and
wherein the managed execution environment is configured to expose a mobile resource management (MRM) agent on the computing device to the one or more web applications, the MRM agent being configured to monitor state information associated with the computing device and enforce policies based on the state information,
wherein the managed execution environment is configured to expose one or more functions to the one or more web applications via an application programming interface, and
wherein at least one function of the one or more functions exposed to the one or more web applications via the application programming interface includes a secure data storage function.
18. The method ofclaim 1, wherein the managed execution environment is configured to extend at least one secure key management function to the one or more web applications via the MRM agent.
US14/043,3432013-03-292013-10-01Providing a managed browserActiveUS8850050B1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/043,343US8850050B1 (en)2013-03-292013-10-01Providing a managed browser

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US201361806577P2013-03-292013-03-29
US201361866229P2013-08-152013-08-15
US14/040,831US9355223B2 (en)2013-03-292013-09-30Providing a managed browser
US14/043,343US8850050B1 (en)2013-03-292013-10-01Providing a managed browser

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/040,831ContinuationUS9355223B2 (en)2013-03-292013-09-30Providing a managed browser

Publications (2)

Publication NumberPublication Date
US8850050B1true US8850050B1 (en)2014-09-30
US20140297862A1 US20140297862A1 (en)2014-10-02

Family

ID=51588300

Family Applications (10)

Application NumberTitlePriority DateFiling Date
US14/040,831Active2034-06-14US9355223B2 (en)2013-03-292013-09-30Providing a managed browser
US14/043,012ActiveUS8893221B2 (en)2013-03-292013-10-01Providing a managed browser
US14/043,229ActiveUS9158895B2 (en)2013-03-292013-10-01Providing a managed browser
US14/043,343ActiveUS8850050B1 (en)2013-03-292013-10-01Providing a managed browser
US14/042,984ActiveUS8850010B1 (en)2013-03-292013-10-01Providing a managed browser
US14/043,301ActiveUS8996709B2 (en)2013-03-292013-10-01Providing a managed browser
US14/043,164ActiveUS8898732B2 (en)2013-03-292013-10-01Providing a managed browser
US14/042,941ActiveUS8881228B2 (en)2013-03-292013-10-01Providing a managed browser
US14/043,086ActiveUS9112853B2 (en)2013-03-292013-10-01Providing a managed browser
US15/140,683Active2034-09-10US10097584B2 (en)2013-03-292016-04-28Providing a managed browser

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US14/040,831Active2034-06-14US9355223B2 (en)2013-03-292013-09-30Providing a managed browser
US14/043,012ActiveUS8893221B2 (en)2013-03-292013-10-01Providing a managed browser
US14/043,229ActiveUS9158895B2 (en)2013-03-292013-10-01Providing a managed browser

Family Applications After (6)

Application NumberTitlePriority DateFiling Date
US14/042,984ActiveUS8850010B1 (en)2013-03-292013-10-01Providing a managed browser
US14/043,301ActiveUS8996709B2 (en)2013-03-292013-10-01Providing a managed browser
US14/043,164ActiveUS8898732B2 (en)2013-03-292013-10-01Providing a managed browser
US14/042,941ActiveUS8881228B2 (en)2013-03-292013-10-01Providing a managed browser
US14/043,086ActiveUS9112853B2 (en)2013-03-292013-10-01Providing a managed browser
US15/140,683Active2034-09-10US10097584B2 (en)2013-03-292016-04-28Providing a managed browser

Country Status (6)

CountryLink
US (10)US9355223B2 (en)
EP (2)EP2979218A1 (en)
JP (2)JP6131381B2 (en)
KR (2)KR102038842B1 (en)
CN (1)CN105247531B (en)
WO (1)WO2014158228A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9355228B2 (en)2012-07-132016-05-31Angel Secure Networks, Inc.System and method for policy driven protection of remote computing environments
US10713087B2 (en)*2014-01-102020-07-14Citrix Systems, Inc.Management of unmanaged user accounts and tasks in a multi-account mobile application
US20210081362A1 (en)*2019-09-132021-03-18Citrix Systems, Inc.Multi-web application collaboration techniques
US20210136059A1 (en)*2019-11-052021-05-06Salesforce.Com, Inc.Monitoring resource utilization of an online system based on browser attributes collected for a session
US20210211507A1 (en)*2018-09-242021-07-08Salesforce.Com, Inc.Multi-channel session connection management mechanism
US20220294788A1 (en)*2021-03-092022-09-15Oracle International CorporationCustomizing authentication and handling pre and post authentication in identity cloud service
US20230237171A1 (en)*2022-01-212023-07-27Vmware, Inc.Securing web browsing on a managed user device
US12041041B2 (en)*2019-08-212024-07-16Truist BankLocation-based mobile device authentication
US12289308B2 (en)*2020-11-132025-04-29Cyberark Software Ltd.Native remote access to target resources using secretless connections

Families Citing this family (106)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9379895B2 (en)*2008-07-242016-06-28Zscaler, Inc.HTTP authentication and authorization management
US9280377B2 (en)2013-03-292016-03-08Citrix Systems, Inc.Application with multiple operation modes
US20140032733A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US9215225B2 (en)2013-03-292015-12-15Citrix Systems, Inc.Mobile device locking with context
US9529996B2 (en)2011-10-112016-12-27Citrix Systems, Inc.Controlling mobile device access to enterprise resources
US9043480B2 (en)2011-10-112015-05-26Citrix Systems, Inc.Policy-based application management
US20140108558A1 (en)2012-10-122014-04-17Citrix Systems, Inc.Application Management Framework for Secure Data Sharing in an Orchestration Framework for Connected Devices
US9774658B2 (en)2012-10-122017-09-26Citrix Systems, Inc.Orchestration framework for connected devices
US9516022B2 (en)2012-10-142016-12-06Getgo, Inc.Automated meeting room
US8910239B2 (en)2012-10-152014-12-09Citrix Systems, Inc.Providing virtualized private network tunnels
US20140109176A1 (en)2012-10-152014-04-17Citrix Systems, Inc.Configuring and providing profiles that manage execution of mobile applications
EP2909715B1 (en)2012-10-162022-12-14Citrix Systems, Inc.Application wrapping for application management framework
US9971585B2 (en)2012-10-162018-05-15Citrix Systems, Inc.Wrapping unmanaged applications on a mobile device
US9606774B2 (en)2012-10-162017-03-28Citrix Systems, Inc.Wrapping an application with field-programmable business logic
US20140108793A1 (en)2012-10-162014-04-17Citrix Systems, Inc.Controlling mobile device access to secure data
US9369449B2 (en)2013-03-292016-06-14Citrix Systems, Inc.Providing an enterprise application store
US9455886B2 (en)2013-03-292016-09-27Citrix Systems, Inc.Providing mobile device management functionalities
US10284627B2 (en)2013-03-292019-05-07Citrix Systems, Inc.Data management for an application with multiple operation modes
US9355223B2 (en)2013-03-292016-05-31Citrix Systems, Inc.Providing a managed browser
US9985850B2 (en)2013-03-292018-05-29Citrix Systems, Inc.Providing mobile device management functionalities
JP6448062B2 (en)*2013-05-072019-01-09ノーム ザタロブスキ、ヨーニ A system for browsing with personalized and customizable smart browsers
US9342331B2 (en)*2013-10-212016-05-17International Business Machines CorporationSecure virtualized mobile cellular device
US20150134725A1 (en)*2013-11-132015-05-14Adrian Cesena, Jr.Computer-implemented methods, computer readable medium and systems for virtual application execution
US9870116B1 (en)*2013-12-092018-01-16Google LlcControlling actions for browser extensions
US10362026B2 (en)2013-12-162019-07-23Amazon Technologies, Inc.Providing multi-factor authentication credentials via device notifications
US9473491B1 (en)2014-12-162016-10-18Amazon Technologies, Inc.Computing device with integrated authentication token
US10866711B1 (en)2013-12-162020-12-15Amazon Technologies, Inc.Providing account information to applications
US10841297B2 (en)2013-12-162020-11-17Amazon Technologies, Inc.Providing multi-factor authentication credentials via device notifications
WO2015099699A1 (en)*2013-12-242015-07-02Intel CorporationContext sensitive multi-mode authentication
US9680872B1 (en)2014-03-252017-06-13Amazon Technologies, Inc.Trusted-code generated requests
US9854001B1 (en)*2014-03-252017-12-26Amazon Technologies, Inc.Transparent policies
US9930095B2 (en)*2014-03-262018-03-27Google LlcSystem for managing extension modifications to web pages
US10560439B2 (en)*2014-03-272020-02-11Arris Enterprises, Inc.System and method for device authorization and remediation
US9813421B2 (en)2014-05-202017-11-07Box, Inc.Systems and methods for secure resource access and network communication
US10243953B2 (en)*2014-05-202019-03-26Box, Inc.Systems and methods for secure resource access and network communication
US9497197B2 (en)2014-05-202016-11-15Box, Inc.Systems and methods for secure resource access and network communication
US9712520B1 (en)*2015-06-232017-07-18Amazon Technologies, Inc.User authentication using client-side browse history
US9646104B1 (en)2014-06-232017-05-09Amazon Technologies, Inc.User tracking based on client-side browse history
US10182046B1 (en)2015-06-232019-01-15Amazon Technologies, Inc.Detecting a network crawler
KR101695639B1 (en)*2014-08-132017-01-16(주)잉카엔트웍스Method and system for providing application security service based on cloud
US10209973B2 (en)*2014-09-162019-02-19Salesforce.Com, Inc.Private application distribution mechanisms and architectures
US10225245B2 (en)*2014-11-182019-03-05Auth0, Inc.Identity infrastructure as a service
US20160191645A1 (en)*2014-12-302016-06-30Citrix Systems, Inc.Containerizing Web Applications for Managed Execution
US10404701B2 (en)*2015-01-212019-09-03Onion ID Inc.Context-based possession-less access of secure information
SG10201500698YA (en)*2015-01-292016-08-30Huawei Internat Pte LtdMethod for data protection using isolated environment in mobile device
US9917920B2 (en)2015-02-242018-03-13Xor Data Exchange, IncSystem and method of reciprocal data sharing
EP3292475B1 (en)*2015-05-072020-07-08Appbus, Inc.Secure container platform for resource access and placement on unmanaged and unsecured devices
US9882887B2 (en)2015-06-152018-01-30Airwatch LlcSingle sign-on for managed mobile devices
US10812464B2 (en)2015-06-152020-10-20Airwatch LlcSingle sign-on for managed mobile devices
US10944738B2 (en)2015-06-152021-03-09Airwatch, Llc.Single sign-on for managed mobile devices using kerberos
US11057364B2 (en)2015-06-152021-07-06Airwatch LlcSingle sign-on for managed mobile devices
US10171447B2 (en)2015-06-152019-01-01Airwatch LlcSingle sign-on for unmanaged mobile devices
US10290022B1 (en)2015-06-232019-05-14Amazon Technologies, Inc.Targeting content based on user characteristics
US9864852B2 (en)*2015-07-272018-01-09Amazon Technologies, Inc.Approaches for providing multi-factor authentication credentials
CN107209751B (en)*2015-08-132020-09-08华为技术有限公司Service processing method and device
US10361936B2 (en)*2015-08-192019-07-23Google LlcFiltering content based on user mobile network and data-plan
US10601669B2 (en)*2015-10-272020-03-24Vmware, Inc.Configurable client filtering rules
US10187374B2 (en)*2015-10-292019-01-22Airwatch LlcMulti-factor authentication for managed applications using single sign-on technology
US9866546B2 (en)2015-10-292018-01-09Airwatch LlcSelectively enabling multi-factor authentication for managed devices
US9854405B2 (en)2015-11-102017-12-26At&T Intellectual Property I, L.P.Mobile application and device feature regulation based on profile data
US9992187B2 (en)*2015-12-212018-06-05Cisco Technology, Inc.Single sign-on authentication via browser for client application
EP3335395B1 (en)2016-02-012021-03-24Google LLCSystems and methods for dynamically restricting the rendering of unauthorized content included in information resources
EP3335148B1 (en)2016-02-012019-07-10Google LLCSystems and methods for deploying countermeasures against unauthorized scripts interfering with the rendering of content elements on information resources
US10366243B2 (en)*2016-02-042019-07-30Airwatch, LlcPreventing restricted content from being presented to unauthorized individuals
US9954894B2 (en)2016-03-042018-04-24Microsoft Technology Licensing, LlcWebpage security
CN105610873A (en)*2016-03-222016-05-25广东欧珀移动通信有限公司 Identity verification method and device
US10291636B2 (en)*2016-05-232019-05-14International Business Machines CorporationModifying a user session lifecycle in a cloud broker environment
US10868883B2 (en)*2016-06-292020-12-15Nicira, Inc.Upgrading a proxy that decouples network connections from an application during application's downtime
US20190182234A1 (en)*2016-08-162019-06-13Hanselware, Inc.Storing, managing and accessing information in a repository within a security context
US10333930B2 (en)*2016-11-142019-06-25General Electric CompanySystem and method for transparent multi-factor authentication and security posture checking
US10848501B2 (en)*2016-12-302020-11-24Microsoft Technology Licensing, LlcReal time pivoting on data to model governance properties
US11165751B2 (en)2017-02-162021-11-02Emerald Cactus Ventures, Inc.System and method for establishing simultaneous encrypted virtual private networks from a single computing device
US11165825B2 (en)2017-02-162021-11-02Emerald Cactus Ventures, Inc.System and method for creating encrypted virtual private network hotspot
US11122013B2 (en)*2017-02-162021-09-14Emerald Cactus Ventures, Inc.System and method for encrypting data interactions delineated by zones
US11050832B2 (en)2017-03-292021-06-29Citrix Systems, Inc.Maintaining a session across multiple web applications
US10614233B2 (en)2017-07-272020-04-07International Business Machines CorporationManaging access to documents with a file monitor
US11070630B2 (en)2018-05-042021-07-20Citrix Systems, Inc.Computer system providing SAAS application session state migration features and related methods
AU2019262187B2 (en)*2018-05-042022-02-24Citrix Systems, Inc.Systems and methods for providing data loss prevention via an embedded browser
CN116560970A (en)*2018-05-072023-08-08谷歌有限责任公司 Immersive web-based simulator for digital assistant-based applications
US10887287B2 (en)2018-05-112021-01-05Citrix Systems, Inc.Connecting client devices to anonymous sessions via helpers
US10599486B1 (en)*2018-09-212020-03-24Citrix Systems, Inc.Systems and methods for intercepting and enhancing SaaS application calls via embedded browser
US10924545B2 (en)2018-10-102021-02-16Citrix Systems, Inc.Computer system providing mirrored SAAS application sessions and related methods
US10820194B2 (en)*2018-10-232020-10-27Duo Security, Inc.Systems and methods for securing access to computing resources by an endpoint device
US11074338B2 (en)2018-10-232021-07-27Citrix Systems, Inc.Local secure rendering of web content
US11196714B2 (en)*2018-11-072021-12-07Citrix Systems, Inc.Systems and methods for encrypted browser cache
US10996819B2 (en)2018-11-122021-05-04Citrix Systems, Inc.Systems and methods for intellisense for SaaS application
US11019066B2 (en)*2018-11-162021-05-25Citrix Systems, Inc.Systems and methods for securely managing browser plugins via embedded browser
US11057373B2 (en)2018-11-162021-07-06Bank Of America CorporationSystem for authentication using channel dependent one-time passwords
US11165871B2 (en)*2019-02-012021-11-02Citrix Systems, Inc.Computer system providing context-based Software as a Service (SaaS) application session switching and related methods
US11556699B2 (en)*2019-02-042023-01-17Citrix Systems, Inc.Data migration across SaaS applications
US11790176B2 (en)*2019-03-192023-10-17Servicenow, Inc.Systems and methods for a virtual agent in a cloud computing environment
IT201900005876A1 (en)*2019-04-162020-10-16Roberto Griggio SYSTEM AND METHOD FOR MANAGING THE MULTI-DOMAIN ACCESS CREDENTIALS OF A USER ENABLED TO ACCESS A PLURALITY OF DOMAINS
US11323480B2 (en)2019-05-072022-05-03Cisco Technology, Inc.Policy enforcement and introspection on an authentication system
US11038988B2 (en)*2019-08-262021-06-15Citrix Systems, Inc.System and methods for providing user analytics and performance feedback for web applications
CN110912896B (en)*2019-11-272022-02-25厦门市美亚柏科信息股份有限公司Non-invasive HTTP interface security policy injection method
US11252157B1 (en)*2020-03-122022-02-15Amazon Technologies, Inc.Permission management for electronic resources
US11588801B1 (en)2020-03-122023-02-21Amazon Technologies, Inc.Application-centric validation for electronic resources
US11182054B2 (en)*2020-03-272021-11-23Coupang Corp.Web-browser plugin for consolidating requested disaggregated information
US12081979B2 (en)*2020-11-052024-09-03Visa International Service AssociationOne-time wireless authentication of an Internet-of-Things device
US11921872B2 (en)*2020-12-162024-03-05International Business Machines CorporationAccess control for a data object including data with different access requirements
JP7730377B2 (en)2021-04-222025-08-27パロ アルト ネットワークス,インコーポレイテッド Cybersecurity Systems
US12218974B2 (en)*2022-01-212025-02-04Omnissa, LlcSecuring web browsing on a managed user device
US12284427B2 (en)2022-03-212025-04-22Samsung Electronics Co., Ltd.Infrared detector and infrared image sensor including the same
KR102498461B1 (en)*2022-04-252023-02-13주식회사 디엠테크컨설팅Integrated management method using single sign-on manufacturing information integrated management system
US11792234B1 (en)2022-11-112023-10-17Netskope, Inc.Browser extension identification and isolation
CN115883191A (en)*2022-11-292023-03-31国家能源集团宁夏煤业有限责任公司Communication method, computer-readable storage medium and communication system for enterprise intranet

Citations (270)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5805803A (en)1997-05-131998-09-08Digital Equipment CorporationSecure web tunnel
WO1999014652A1 (en)1997-09-161999-03-25Microsoft CorporationEncrypting file system and method
US6151606A (en)1998-01-162000-11-21Visto CorporationSystem and method for using a workspace data manager to access, manipulate and synchronize network data
US6154172A (en)1998-03-312000-11-28Piccionelli; Gregory A.System and process for limiting distribution of information on a communication network based on geographic location
US20020112047A1 (en)2000-12-052002-08-15Rakesh KushwahaSystem and method for wireless data terminal management using general packet radio service network
WO2002084460A2 (en)2001-04-122002-10-24The Regents Of The University Of MichiganMethod and system to maintain portable computer data secure and authentication token for use therein
US20030031319A1 (en)2001-06-132003-02-13Miki AbeData transfer system, data transfer apparatus, data recording apparatus, edit controlling method and data processing method
US20030037103A1 (en)2001-03-142003-02-20Nokia CorporationRealization of presence management
US20030046366A1 (en)2001-02-132003-03-06Shishir PardikarSystem and method for providing transparent access to distributed authoring and versioning files including encrypted files
US20030131245A1 (en)2002-01-042003-07-10Michael LindermanCommunication security system
US6609198B1 (en)1999-08-052003-08-19Sun Microsystems, Inc.Log-on service providing credential level change without loss of session continuity
US6621766B2 (en)2001-08-012003-09-16Fossil, Inc.Flexible timepiece in multiple environments
US20040006706A1 (en)*2002-06-062004-01-08Ulfar ErlingssonMethods and systems for implementing a secure application execution environment using derived user accounts for internet content
US20040010579A1 (en)2000-08-312004-01-15Esko FreeseWireless device management
US20040083273A1 (en)2001-01-182004-04-29Madison Justin PaulMethod and system for managing digital content, including streaming media
US20040111640A1 (en)2002-01-082004-06-10Baum Robert T.IP based security applications using location, port and/or device identifier information
EP1465039A1 (en)2002-01-082004-10-06NTT DoCoMo, Inc.Content delivery method and content delivery system
US20040205233A1 (en)2001-08-292004-10-14Dunk Craig A.System and method for addressing a mobile device in an ip-based wireless network
US20040230807A1 (en)2001-02-122004-11-18Baird Leemon C.Apparatus and method for authenticating access to a network resource
WO2004107646A1 (en)2003-05-142004-12-09Threatguard, Inc.System and method for application-level virtual private network
US6859879B2 (en)2000-05-262005-02-22International Business Machine CorporationMethod and system for secure pervasive access
US20050055578A1 (en)2003-02-282005-03-10Michael WrightAdministration of protection of data accessible by a mobile device
US6883098B1 (en)2000-09-202005-04-19International Business Machines CorporationMethod and computer system for controlling access by applications to this and other computer systems
US20050097608A1 (en)2003-10-302005-05-05Xerox CorporationMultimedia communications/collaboration hub
US20050172241A1 (en)2004-01-082005-08-04International Business Machines CorporationSystem and method for improved direct system clipboard
GB2411320A (en)2004-02-232005-08-24Nec CorpAccess control management in a terminal device
US20050255838A1 (en)2004-04-302005-11-17Adams Neil PSystem and method for handling data transfers
US20050273592A1 (en)2004-05-202005-12-08International Business Machines CorporationSystem, method and program for protecting communication
US20060075123A1 (en)2004-09-272006-04-06Citrix Systems, Inc.System and method for managing virtual ip addresses
US20060085826A1 (en)2004-10-182006-04-20Funk James MAggregated program guide for download and view video on demand service
US20060094400A1 (en)2003-02-282006-05-04Brent BeachemSystem and method for filtering access points presented to a user and locking onto an access point
US7043453B2 (en)1994-11-232006-05-09Contentguard Holdings, Inc.Method and system for conducting transactions between repositories using a repository transaction protocol
US20060117104A1 (en)2004-09-172006-06-01Fujitsu LimitedSetting information distribution apparatus, method, program, and medium, authentication setting transfer apparatus, method, program, and medium, and setting information reception program
US20060120526A1 (en)2003-02-282006-06-08Peter BoucherAccess control to files based on source information
US20060141985A1 (en)2004-12-232006-06-29Motorola, Inc.Dynamic management for interface access permissions
US20060147043A1 (en)2002-09-232006-07-06Credant Technologies, Inc.Server, computer memory, and method to support security policy maintenance and distribution
US20060161635A1 (en)2000-09-072006-07-20Sonic SolutionsMethods and system for use in network management of content
US20060224742A1 (en)2005-02-282006-10-05Trust DigitalMobile data security system and methods
US20060225142A1 (en)2005-04-052006-10-05Cisco Technology, Inc. (A California Corporation)Method and electronic device for triggering zeroization in a electronic device
US20060242685A1 (en)2002-09-232006-10-26Credant Technologies, Inc.System and method for distribution of security policies for mobile devices
US7159120B2 (en)2001-11-192007-01-02Good Technology, Inc.Method and system for protecting data within portable electronic devices
US20070005713A1 (en)2005-07-012007-01-04Levasseur ThierrySecure electronic mail system
US20070011749A1 (en)2005-07-112007-01-11Simdesk TechnologiesSecure clipboard function
US20070038764A1 (en)2005-06-072007-02-15AlcatelNetwork equipment for supplying multimode mobile terminals with data necessary for automatically selecting radio access network interfaces during service sessions
US20070049297A1 (en)2005-08-292007-03-01Janakiraman GopalanSystem and method for locating mobile devices through a direct-connection protocol
US20070056043A1 (en)2005-05-192007-03-08Richard OnyonRemote cell phone auto destruct
US20070074033A1 (en)2005-09-292007-03-29Research In Motion LimitedAccount management in a system and method for providing code signing services
US20070109983A1 (en)2005-11-112007-05-17Computer Associates Think, Inc.Method and System for Managing Access to a Wireless Network
US7240015B1 (en)1999-09-172007-07-03Mitel Networks Corporation And The University Of OttawaPolicy representations and mechanisms for the control of software
US20070156897A1 (en)2005-12-292007-07-05Blue JungleEnforcing Control Policies in an Information Management System
US20070180447A1 (en)2006-01-242007-08-02Citrix Systems, Inc.Methods and systems for interacting, via a hypermedium page, with a virtual machine
US7254831B2 (en)2002-12-042007-08-07Microsoft CorporationSharing a sign-in among software applications having secured features
US20070186106A1 (en)2006-01-262007-08-09Ting David MSystems and methods for multi-factor authentication
US20070199051A1 (en)2006-02-152007-08-23Microsoft CorporationSecurely hosting a webbrowser control in a managed code environment
US20070204153A1 (en)2006-01-042007-08-30Tome Agustin JTrusted host platform
US7269605B1 (en)2004-02-132007-09-11Avidian TechnologiesPersonal information manager data synchronization and augmentation
US20070214272A1 (en)2006-03-072007-09-13Novell, Inc.Light-weight multi-user browser
US20070226225A1 (en)2006-03-222007-09-27Yiu Timothy CMobile collaboration and communication system
US20070226773A1 (en)2006-03-212007-09-27Novell, Inc.System and method for using sandboxes in a managed shell
WO2007113709A1 (en)2006-03-302007-10-11Koninklijke Philips Electronics N.V.Method and apparatus for assigning an application to a security restriction
US20080027982A1 (en)2006-07-272008-01-31Ebay Inc.Indefinite caching expiration techniques
US20080047015A1 (en)2006-08-082008-02-21Andrew CornwallMethod to provide a secure virtual machine launcher
US20080052395A1 (en)2003-02-282008-02-28Michael WrightAdministration of protection of data accessible by a mobile device
US7340772B2 (en)2001-06-132008-03-04Citrix Systems, Inc.Systems and methods for continuing an operation interrupted from a reconnection between a client and server
US20080066020A1 (en)2004-09-162008-03-13Boss Gregory JSystem and Method to Capture and Manage Input Values for Automatic Form Fill
US20080066177A1 (en)2006-09-082008-03-13International Business Machines CorporationMethods, systems, and computer program products for implementing inter-process integrity serialization
US20080070495A1 (en)2006-08-182008-03-20Michael StricklenMobile device management
US20080127292A1 (en)2006-08-042008-05-29Apple Computer, Inc.Restriction of program process capabilities
US20080133729A1 (en)2006-08-172008-06-05Neustar, Inc.System and method for managing domain policy for interconnected communication networks
US20080134292A1 (en)2003-01-082008-06-05Ido ArielExtending user relationships
US20080141335A1 (en)2006-12-082008-06-12Novell, Inc.Provisioning software with policy-appropriate capabilities
US20080163286A1 (en)2006-12-292008-07-03Echostar Technologies CorporationControlling access to content and/or services
WO2008086611A1 (en)2007-01-192008-07-24Research In Motion LimitedSelectively wiping a remote device
US20080196038A1 (en)2007-02-082008-08-14Microsoft CorporationUtilizing a first managed process to host at least a second managed process
US7415498B2 (en)2003-12-102008-08-19International Business Machines CorporationTime limited collaborative community role delegation policy
US20080209506A1 (en)2006-08-142008-08-28Quantum Secure, Inc.Physical access control and security monitoring system utilizing a normalized data format
US20080214300A1 (en)2000-12-072008-09-04IgtMethods for electronic data security and program authentication
US20080235760A1 (en)2006-05-022008-09-25International Business Machines CorporationConfidential Content Reporting System and Method with Electronic Mail Verification Functionality
US20080313648A1 (en)2007-06-142008-12-18Microsoft CorporationProtection and communication abstractions for web browsers
US20080318616A1 (en)2007-06-212008-12-25Verizon Business Network Services, Inc.Flexible lifestyle portable communications device
US20090006232A1 (en)2007-06-292009-01-01Gallagher Ken ASecure computer and internet transaction software and hardware and uses thereof
US20090028049A1 (en)2007-07-272009-01-29Jesse BoudreauAdministration of policies for wireless devices in a wireless communication system
US20090030968A1 (en)2007-07-272009-01-29Jesse BoudreauRemote control in a wireless communication system
US7490073B1 (en)2004-12-212009-02-10Zenprise, Inc.Systems and methods for encoding knowledge for automated management of software application deployments
US7496954B1 (en)2004-11-222009-02-24Sprint Communications Company L.P.Single sign-on system and method
US20090077638A1 (en)2007-09-172009-03-19Novell, Inc.Setting and synching preferred credentials in a disparate credential store environment
US7529923B2 (en)2005-06-302009-05-05Intel CorporationOperating system mode transfer
US20090119773A1 (en)2007-11-022009-05-07D Amore Tianyu LiApparatus and methods of configurable system event and resource arbitration management
US20090172789A1 (en)2007-12-272009-07-02Hewlett-Packard Development Company, L.P.Policy Based, Delegated Limited Network Access Management
US20090170532A1 (en)2007-12-282009-07-02Apple Inc.Event-based modes for electronic devices
US20090178111A1 (en)1998-10-282009-07-09Bea Systems, Inc.System and method for maintaining security in a distributed computer network
US20090199277A1 (en)2008-01-312009-08-06Norman James MCredential arrangement in single-sign-on environment
US20090221278A1 (en)2005-12-302009-09-03Telecom Italia S.P.A.Method for Customizing the Operation of a Telephonic Terminal
US20090222880A1 (en)2008-03-032009-09-03Tresys Technology, LlcConfigurable access control security for virtualization
US20090228954A1 (en)2008-03-072009-09-10At&T Mobility Ii LlcSystem and method for policy-enabled mobile service gateway
US20090228714A1 (en)2004-11-182009-09-10Biogy, Inc.Secure mobile device with online vault
US20090228963A1 (en)2007-11-262009-09-10Nortel Networks LimitedContext-based network security
US7596593B2 (en)1999-09-072009-09-29Citrix Systems, LlcMethods and apparatus for efficiently transmitting interactive application data between a client and server using markup language
US20090249359A1 (en)2008-03-252009-10-01Caunter Mark LeslieApparatus and methods for widget intercommunication in a wireless communication environment
US7599991B2 (en)2004-03-102009-10-06Microsoft CorporationRules interface for implementing message rules on a mobile computing device
US20090325615A1 (en)2008-06-292009-12-31Oceans' Edge, Inc.Mobile Telephone Firewall and Compliance Enforcement System and Method
GB2462442A (en)2008-08-062010-02-10Zybert Computing LtdA remote server centrally controls access to data stored in a data container in an encrypted form
US20100077469A1 (en)2008-09-192010-03-25Michael FurmanSingle Sign On Infrastructure
US7697737B2 (en)2005-03-252010-04-13Northrop Grumman Systems CorporationMethod and system for providing fingerprint enabled wireless add-on for personal identification number (PIN) accessible smartcards
US20100100825A1 (en)2008-10-162010-04-22Accenture Global Services GmbhMethod, system and graphical user interface for enabling a user to access enterprise data on a portable electronic device
US20100100925A1 (en)2008-10-162010-04-22International Business Machines CorporationDigital Rights Management (DRM)-Enabled Policy Management For An Identity Provider In A Federated Environment
US20100124196A1 (en)2005-06-292010-05-20Jumpstart Wireless CorporationSystem and method for dynamic automatic communication path selection, distributed device synchronization and task delegation
US20100146523A1 (en)2008-12-052010-06-10Tripod Ventures Inc./ Entreprises Tripod Inc.Browser environment application and local file server application system
US20100154025A1 (en)2008-12-122010-06-17Microsoft CorporationIntegrating policies from a plurality of disparate management agents
US20100150341A1 (en)2008-12-172010-06-17David DodgsonStorage security using cryptographic splitting
US7761523B2 (en)2007-02-092010-07-20Research In Motion LimitedSchedulable e-mail filters
US20100192212A1 (en)2009-01-282010-07-29Gregory G. RaleighAutomated device provisioning and activation
US7788535B2 (en)2005-01-282010-08-31Nxp B.V.Means and method for debugging
US20100229197A1 (en)2007-10-312010-09-09Pxd, Inc.Digital broadcast widget system
US20100248699A1 (en)2009-03-312010-09-30Dumais Paul Mark JosephRemote application storage
WO2010115289A1 (en)2009-04-092010-10-14Aegis Mobility, Inc.Context based data mediation
US20100287619A1 (en)2009-05-052010-11-11Absolute Software CorporationDiscriminating data protection system
US20100299152A1 (en)2009-05-202010-11-25Mobile Iron, Inc.Selective Management of Mobile Devices in an Enterprise Environment
US20100299376A1 (en)2009-05-202010-11-25Mobile Iron, Inc.Selective Management of Mobile Devices in an Enterprise Environment
US20100319053A1 (en)2009-06-122010-12-16Apple Inc.Devices with profile-based operating mode controls
US20100317336A1 (en)2009-06-162010-12-16Bran FerrenContext-based limitation of mobile device operation
US20100325097A1 (en)2007-02-072010-12-23International Business Machines CorporationNon-Invasive Usage Tracking, Access Control, Policy Enforcement, Audit Logging, and User Action Automation On Software Applications
US7904468B2 (en)2008-02-272011-03-08Research In Motion LimitedMethod and software for facilitating interaction with a personal information manager application at a wireless communication device
US7950066B1 (en)2001-12-212011-05-24Guardian Data Storage, LlcMethod and system for restricting use of a clipboard application
US20110145833A1 (en)2009-12-152011-06-16At&T Mobility Ii LlcMultiple Mode Mobile Device
US7966323B2 (en)2004-09-132011-06-21Research In Motion LimitedEnabling category-based filtering
US7966652B2 (en)2008-04-072011-06-21Safemashups Inc.Mashauth: using mashssl for efficient delegated authentication
US20110154477A1 (en)2009-12-222011-06-23Cisco Technology, Inc.Dynamic content-based routing
US7970386B2 (en)2005-06-032011-06-28Good Technology, Inc.System and method for monitoring and maintaining a wireless device
US20110179484A1 (en)2006-04-062011-07-21Juniper Networks, Inc.Malware detection system and method for mobile platforms
US8001278B2 (en)2007-09-282011-08-16Intel CorporationNetwork packet payload compression
US20110209064A1 (en)2010-02-242011-08-25Novell, Inc.System and method for providing virtual desktop extensions on a client desktop
US20110208838A1 (en)2001-11-022011-08-25Juniper Networks, Inc.Method and system for providing secure access to private networks with client redirection
US8012219B2 (en)2002-08-092011-09-06Visto CorporationSystem and method for preventing access to data on a compromised remote device
US20110219124A1 (en)*2010-03-052011-09-08Brass Monkey, Inc.System and method for two way communication and controlling content in a web browser
US20110225417A1 (en)2006-12-132011-09-15Kavi MaharajhDigital rights management in a mobile environment
US20110239125A1 (en)2010-03-242011-09-29Kristensen Kristian HUsing multiple display servers to protect data
US8037421B2 (en)2005-10-112011-10-11Research In Motion LimitedSystem and method for organizing application indicators on an electronic device
US20110252232A1 (en)2010-04-072011-10-13Apple Inc.System and method for wiping encrypted data on a device having file-level content protection
US20110258301A1 (en)2010-04-152011-10-20Research In Motion LimitedMethod and system for transmitting an application to a device
US20110271279A1 (en)2010-04-292011-11-03High Cloud Security, Inc.Secure Virtual Machine
US20110276699A1 (en)2010-05-092011-11-10Pedersen Bradley JSystems and methods for allocation of classes of service to network connections corresponding to virtual channels
US20110276683A1 (en)2010-05-062011-11-10Trust Digital, LlcDistributed data revocation using data commands
US8060074B2 (en)2007-07-302011-11-15Mobile Iron, Inc.Virtual instance architecture for mobile device management systems
US20110295970A1 (en)2010-05-272011-12-01Canon Kabushiki KaishaCloud computing system, server computer, device connection method, and storage medium
US8085891B2 (en)2006-05-292011-12-27Research In Motion LimitedSystem and method for management of mobile device communication
US20120005745A1 (en)2010-06-302012-01-05Juniper Networks, Inc.Vpn network client for mobile device having dynamically translated user home page
US20120005746A1 (en)2010-06-302012-01-05Juniper Networks, Inc.Dual-mode multi-service vpn network client for mobile device
US20120005724A1 (en)2009-02-092012-01-05Imera Systems, Inc.Method and system for protecting private enterprise resources in a cloud computing environment
US20120005476A1 (en)2010-06-302012-01-05Juniper Networks, Inc.Multi-service vpn network client for mobile device having integrated acceleration
US8095786B1 (en)2006-11-092012-01-10Juniper Networks, Inc.Application-specific network-layer virtual private network connections
US20120023506A1 (en)2010-07-202012-01-26Apple Inc.Maintaining Data States Upon Forced Exit
US20120036347A1 (en)2010-08-062012-02-09Swanson Robert CProviding fast non-volatile storage in a secure environment
US20120036370A1 (en)2010-07-282012-02-09Nextlabs, Inc.Protecting Documents Using Policies and Encryption
US8126128B1 (en)2006-11-012012-02-28At&T Intellectual Property I, LpLife cycle management of user-selected applications on wireless communications devices
US8126506B2 (en)2007-02-142012-02-28Nuance Communications, Inc.System and method for securely managing data stored on mobile devices, such as enterprise mobility data
US20120052954A1 (en)2010-08-312012-03-01Sony Computer Entertainment Inc.Offline Progress of Console Game via Portable Device
EP2428894A1 (en)2010-09-142012-03-14AppSense LimitedPrivate application clipboard
US20120084184A1 (en)2008-06-052012-04-05Raleigh Gregory GEnterprise Access Control and Accounting Allocation for Access Networks
US20120088540A1 (en)2010-10-072012-04-12Research In Motion LimitedProvisioning Based on Application and Device Capability
US20120109384A1 (en)2005-08-192012-05-03Nexstep, Inc.Consumer electronic registration, control and support concierge device and method
US20120117622A1 (en)2007-02-052012-05-10Kaj GronholmDynamic network access control method and apparatus
US20120129503A1 (en)2010-11-192012-05-24MobileIron, Inc.Management of Mobile Applications
US20120131685A1 (en)2010-11-192012-05-24MobileIron, Inc.Mobile Posture-based Policy, Remediation and Access Control for Enterprise Resources
US20120131116A1 (en)2010-11-152012-05-24Van Quy TuControlling data transfer on mobile devices
US20120157166A1 (en)2010-12-212012-06-21Dongwoo KimMobile terminal and method of managing information therein
US20120154413A1 (en)2010-12-212012-06-21Dongwoo KimMobile terminal and method of controlling a mode switching therein
US20120159139A1 (en)2010-12-212012-06-21Dongwoo KimMobile terminal and method of controlling a mode switching therein
US20120157165A1 (en)2010-12-212012-06-21Dongwoo KimMobile terminal and method of controlling a mode switching therein
US20120165075A1 (en)2010-12-222012-06-28Lg Electronics Inc.Mobile terminal and method of displaying information therein
US20120167118A1 (en)2010-12-272012-06-28Microsoft CorporationPower management via coordination and selective operation of timer-related tasks
US20120166997A1 (en)2010-12-222012-06-28Hyunah ChoMobile terminal and method of sharing information therein
US20120166524A1 (en)2010-12-272012-06-28Takeshi WatakabeInformation Processing Apparatus and Removable Media Management Method
US8214887B2 (en)2005-03-202012-07-03Actividentity (Australia) Pty Ltd.Method and system for providing user access to a secure application
US20120179909A1 (en)2011-01-062012-07-12Pitney Bowes Inc.Systems and methods for providing individual electronic document secure storage, retrieval and use
US20120179802A1 (en)2011-01-102012-07-12Fiberlink Communications CorporationSystem and method for extending cloud services into the customer premise
US20120185913A1 (en)2008-06-192012-07-19Servicemesh, Inc.System and method for a cloud computing abstraction layer with security zone facilities
US20120185910A1 (en)2011-01-142012-07-19Nokia CorporationMethod and apparatus for adjusting context-based factors for selecting a security policy
US20120198570A1 (en)2011-02-012012-08-02Bank Of America CorporationGeo-Enabled Access Control
US8239918B1 (en)2011-10-112012-08-07Google Inc.Application marketplace administrative controls
US8238256B2 (en)2008-09-082012-08-07Nugent Raymond MSystem and method for cloud computing
US20120204220A1 (en)2011-02-072012-08-09Tufin Software Technologies Ltd.Method of analyzing security ruleset and system thereof
US20120214472A1 (en)2009-10-312012-08-23Saied TadayonMethod and System for Controlling Mobile Device Functions via a Service or Background Process
US20120222120A1 (en)2011-02-242012-08-30Samsung Electronics Co. Ltd.Malware detection method and mobile terminal realizing the same
US8272030B1 (en)2009-01-212012-09-18Sprint Communications Company L.P.Dynamic security management for mobile communications device
US20120240183A1 (en)2011-03-182012-09-20Amit SinhaCloud based mobile device security and policy enforcement
US20120238257A1 (en)2011-03-162012-09-20Anson Douglas MSystem and method for selectively restricting portable information handling system features
US20120254768A1 (en)2011-03-312012-10-04Google Inc.Customizing mobile applications
US8296239B2 (en)2000-03-102012-10-23Sony CorporationData distribution system and method of same, data processing apparatus and method of same, and data recording medium
US20120272221A1 (en)2011-04-222012-10-25Microsoft CorporationRule based data driven validation
US20120278454A1 (en)2011-04-262012-11-01Stewart Brett BGateway Device Application Development System
US20120284325A1 (en)2011-05-022012-11-08Mitel Networks CorporationRegulating use of a mobile computing device for a user at a selected location
US20120284779A1 (en)2011-05-042012-11-08Apple Inc.Electronic devices having adaptive security profiles and methods for selecting the same
US20120290694A9 (en)2004-12-072012-11-15Brett MarlNetwork administration tool
US20120303778A1 (en)2011-04-282012-11-29Approxy Inc. Ltd.Application Distribution Network
US20120304310A1 (en)2011-03-212012-11-29Mocana CorporationSecure execution of unsecured apps on a device
US20120303476A1 (en)2010-11-092012-11-29Openpeak Inc.Communication devices, networks, services and accompanying methods
US20120311154A1 (en)2011-05-312012-12-06Morgan Christopher EdwinSystems and methods for triggering workload movement based on policy stack having multiple selectable inputs
US20120311659A1 (en)2011-06-012012-12-06Mobileasap, Inc.Real-time mobile application management
US8332464B2 (en)2002-12-132012-12-11Anxebusiness Corp.System and method for remote network access
US20120324568A1 (en)2011-06-142012-12-20Lookout, Inc., A California CorporationMobile web protection
US20120331528A1 (en)2011-06-272012-12-27Osmosix, Inc.Apparatus, systems and methods for secure and selective access to services in hybrid public-private infrastructures
US20120331527A1 (en)2011-06-222012-12-27TerraWi, Inc.Multi-layer, geolocation-based network resource access and permissions
US20130002725A1 (en)2011-06-282013-01-03Dongwoo KimMobile terminal and display controlling method therein
US20130007842A1 (en)2011-06-282013-01-03Hyekyung ParkMobile terminal and display controlling method therein
US20130013653A1 (en)2009-08-052013-01-10International Business Machines CorporationTracking file contents
US20130014239A1 (en)2011-07-082013-01-10International Business Machines CorporationAuthenticating a rich client from within an existing browser session
US20130013688A1 (en)2011-07-072013-01-10Cisco Technology, Inc.System and method for providing a message and an event based video services control plane
US20130024424A1 (en)2009-06-302013-01-24Commvault Systems, Inc.Data object store and server for a cloud storage environment, including data deduplication and data management across multiple cloud storage sites
US20130024928A1 (en)2011-07-222013-01-24Robert James BurkeSecure network communications for meters
US8365258B2 (en)2006-11-162013-01-29Phonefactor, Inc.Multi factor authentication
US20130042294A1 (en)2011-08-082013-02-14Microsoft CorporationIdentifying application reputation based on resource accesses
US20130055378A1 (en)2011-08-292013-02-28Pantech Co., Ltd.Method and portable device for controlling permission settings for application
US20130054922A1 (en)2011-08-232013-02-28Vmware, Inc.Cooperative memory resource management for virtualized computing devices
US20130054962A1 (en)2011-08-312013-02-28Deepak ChawlaPolicy configuration for mobile device applications
US20130059284A1 (en)2011-09-072013-03-07Teegee, LlcInteractive electronic toy and learning device system
US20130066960A1 (en)2011-02-282013-03-14Siemens Enterprise Communications Gmbh & Co. KgApparatus and Mechanism for Dynamic Assignment of Survivability Services to Mobile Devices
US8402011B1 (en)2011-10-102013-03-19Google Inc.System and method for managing user web browsing information
US20130074142A1 (en)2011-09-152013-03-21Microsoft CorporationSecuring data usage in computing devices
US20130086684A1 (en)2011-09-302013-04-04David S. MohlerContextual virtual machines for application quarantine and assessment method and system
US20130084847A1 (en)2009-07-212013-04-04Scott Ferrill TibbittsMethod and system for controlling a mobile communication device
US8418238B2 (en)2008-03-302013-04-09Symplified, Inc.System, method, and apparatus for managing access to resources across a network
US20130091543A1 (en)2011-10-102013-04-11Openpeak Inc.System and method for creating secure applications
US20130097421A1 (en)2011-04-042013-04-18Nextlabs, Inc.Protecting Information Using Policies and Encryption
US20130111540A1 (en)2011-10-282013-05-02Jason Allen SabinCloud protection techniques
US20130117240A1 (en)2010-05-032013-05-09Panzura, Inc.Accessing cached data from a peer cloud controller in a distributed filesystem
US20130117805A1 (en)2011-11-092013-05-09Microsoft CorporationTechniques to apply and share remote policies on mobile devices
US20130130651A1 (en)2011-11-222013-05-23Vmware, Inc.Provisioning work environments on personal mobile devices
US20130132457A1 (en)2011-11-182013-05-23Computer Associates Think, Inc.System and method for hand-offs in cloud environments
US20130138810A1 (en)2011-09-092013-05-30Shuki BinyaminSystems and Methods for Workspace Interaction with Cloud-Based Applications
US20130138766A1 (en)2011-11-292013-05-30Dell Products L.P.Mode sensitive networking
US20130139241A1 (en)2011-11-292013-05-30Michael LeederMethods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains
US20130142043A1 (en)2011-12-062013-06-06T-Mobile Usa, Inc.Quality of service application controller and user equipment application profiler
US20130145448A1 (en)2011-08-052013-06-06Vmware, Inc.Lock screens to access work environments on a personal mobile device
US8463946B2 (en)2004-09-172013-06-11Caterpillar Inc.Method for automatic radio operational mode selection
US20130151598A1 (en)2011-02-092013-06-13Cliqr Technologies Inc.Apparatus, systems and methods for deployment of interactive desktop applications on distributed infrastructures
US8468090B2 (en)2010-05-212013-06-18Hsbc Technologies Inc.Account opening computer system architecture and process for implementing same
US20130171967A1 (en)2012-01-042013-07-04Ayman S. AshourProviding Secure Execution of Mobile Device Workflows
US20130219176A1 (en)2012-01-062013-08-22Venkata Sastry AkellaSecure Virtual File Management System
US20130219211A1 (en)2012-02-172013-08-22International Business Machines CorporationElastic Cloud-Driven Task Execution
US8528059B1 (en)2008-10-062013-09-03Goldman, Sachs & Co.Apparatuses, methods and systems for a secure resource access and placement platform
US20130232541A1 (en)2012-03-022013-09-05International Business Machines CorporationPolicy-driven approach to managing privileged/shared identity in an enterprise
US20130254831A1 (en)2012-03-232013-09-26Lockheed Martin CorporationMethod and apparatus for context aware mobile security
US20130254660A1 (en)2008-03-132013-09-26Robb FujiokaTablet computer
US20130254262A1 (en)2012-03-262013-09-26Quickmobile Inc.System and method for a user to dynamically update a mobile application from a generic or first application within a class of applications to create a specific or second application with said class of applications
US20130263209A1 (en)2012-03-302013-10-03Cognizant Business Services LimitedApparatus and methods for managing applications in multi-cloud environments
US20130263208A1 (en)2012-04-022013-10-03Narsimha Reddy ChallaManaging virtual machines in a cloud computing system
US8560709B1 (en)2004-02-252013-10-15F5 Networks, Inc.System and method for dynamic policy based access over a virtual private network
US20130291052A1 (en)2012-04-302013-10-31Ca, Inc.Trusted public infrastructure grid cloud
US20130298185A1 (en)2012-05-022013-11-07Kony Solutions, Inc.Mobile application management systems and methods thereof
US20130298201A1 (en)2012-05-052013-11-07Citrix Systems, Inc.Systems and methods for network filtering in vpn
US20130298242A1 (en)2012-05-012013-11-07Taasera, Inc.Systems and methods for providing mobile security based on dynamic attestation
US20130297604A1 (en)2012-05-012013-11-07Research In Motion LimitedElectronic device and method for classification of communication data objects
US20130303194A1 (en)2012-05-112013-11-14Iolo Technologies, LlcAutomatic determination of and reaction to mobile user routine behavior based on geographical and repetitive pattern analysis
US20130311597A1 (en)2012-05-162013-11-21Apple Inc.Locally backed cloud-based storage
US20130318345A1 (en)2012-05-222013-11-28Harris CorporationMulti-tunnel virtual private network
US8601562B2 (en)2007-12-102013-12-03Courion CorporationPolicy enforcement using ESSO
US20130333005A1 (en)2012-06-072013-12-12Sk Planet Co., Ltd.Cloud service system based on enhanced security function and method for supporting the same
US8613070B1 (en)2012-10-122013-12-17Citrix Systems, Inc.Single sign-on access in an orchestration framework for connected devices
US20130346268A1 (en)2012-06-212013-12-26Google Inc.Mobile Application Management
US20140007183A1 (en)2011-10-112014-01-02Zenprise, Inc.Controlling mobile device access to enterprise resources
US20140020073A1 (en)2012-07-132014-01-16Troy Jacob RondaMethods and systems for using derived credentials to authenticate a device across multiple platforms
US20140020062A1 (en)2012-07-112014-01-16Chandra Shekhar Rao TumulaTechniques for protecting mobile applications
US20140032759A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US20140032758A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US20140040979A1 (en)2011-10-112014-02-06Citrix Systems, Inc.Policy-Based Application Management
US20140040656A1 (en)2010-08-262014-02-06Adobe Systems IncorporatedSystem and method for managing cloud deployment configuration of an application
US8650620B2 (en)2010-12-202014-02-11At&T Intellectual Property I, L.P.Methods and apparatus to control privileges of mobile device applications
US20140059642A1 (en)2012-08-242014-02-27Vmware, Inc.Method and system for facilitating isolated workspace for applications
US20140059640A9 (en)2009-03-022014-02-27Gregory G. RaleighAdapting Network Policies Based on Device Service Processor Configuration

Family Cites Families (357)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5369702A (en)1993-10-181994-11-29Tecsec IncorporatedDistributed cryptographic object method
EP0880840A4 (en)1996-01-112002-10-23Mrj IncSystem for controlling access and distribution of digital property
US5898830A (en)1996-10-171999-04-27Network Engineering SoftwareFirewall providing enhanced network security and user transparency
JP3001489B2 (en)*1998-01-162000-01-24新潟日本電気ソフトウェア株式会社 TCP / IP communication network browser device
US6219694B1 (en)1998-05-292001-04-17Research In Motion LimitedSystem and method for pushing information from a host system to a mobile data communication device having a shared electronic address
US6480096B1 (en)1998-07-082002-11-12Motorola, Inc.Method and apparatus for theft deterrence and secure data retrieval in a communication device
US7140005B2 (en)1998-12-212006-11-21Intel CorporationMethod and apparatus to test an instruction sequence
US7130831B2 (en)1999-02-082006-10-31Copyright Clearance Center, Inc.Limited-use browser and security system
HRP20020180A2 (en)1999-08-312004-06-30American Express Travel RelateMethods and apparatus for conducting electronic transactions
US20030236861A1 (en)2000-03-032003-12-25Johnson Scott C.Network content delivery system with peer to peer processing components
EP1134643A3 (en)2000-03-142007-01-17Sony CorporationInformation providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system
CA2305078A1 (en)2000-04-122001-10-12Cloakware CorporationTamper resistant software - mass data encoding
US7065652B1 (en)2000-06-212006-06-20Aladdin Knowledge Systems, Ltd.System for obfuscating computer code upon disassembly
US7103915B2 (en)2000-11-132006-09-05Digital Doors, Inc.Data security system and method
US7502861B1 (en)2001-02-162009-03-10Swsoft Holding, Ltd.System and method for providing services for offline servers using the same network address
US20020120607A1 (en)2001-02-282002-08-29Lumenati, Inc.File sharing system for serving content from a computer
US20020180790A1 (en)2001-05-312002-12-05International Business Machines CorporationSystem and method for encapsulating software components in an application program interface using a proxy object
FI120065B (en)*2001-06-052009-06-15Sanako Oy Activity control system for computer-aided learning in a network
US8218829B2 (en)2001-08-202012-07-10Polycom, Inc.System and method for using biometrics technology in conferencing
US7143443B2 (en)2001-10-012006-11-28Ntt Docomo, Inc.Secure sharing of personal devices among different users
US7904392B2 (en)2001-10-252011-03-08Panasonic CorporationContent usage rule management system
US20030103075A1 (en)2001-12-032003-06-05Rosselot Robert CharlesSystem and method for control of conference facilities and equipment
EP3401794A1 (en)2002-01-082018-11-14Seven Networks, LLCConnection architecture for a mobile network
US20030188193A1 (en)2002-03-282003-10-02International Business Machines CorporationSingle sign on for kerberos authentication
JP2003296210A (en)2002-04-032003-10-17Japan Research Institute Ltd Method and apparatus for creating profile setting file
US6804777B2 (en)2002-05-152004-10-12Threatguard, Inc.System and method for application-level virtual private network
US6950825B2 (en)2002-05-302005-09-27International Business Machines CorporationFine grained role-based access to system resources
US6946715B2 (en)2003-02-192005-09-20Micron Technology, Inc.CMOS image sensor and method of fabrication
US6678828B1 (en)2002-07-222004-01-13Vormetric, Inc.Secure network file access control system
US7043106B2 (en)2002-07-222006-05-09Applied Materials, Inc.Optical ready wafers
US7110629B2 (en)2002-07-222006-09-19Applied Materials, Inc.Optical ready substrates
CN1708751A (en)2002-08-232005-12-14国际商业机器公司Processing application data
JP4012785B2 (en)2002-08-272007-11-21日本板硝子株式会社 Optical connection device
US7437752B2 (en)2002-09-232008-10-14Credant Technologies, Inc.Client architecture for portable device with security policies
US7536562B2 (en)2002-10-172009-05-19Research In Motion LimitedSystem and method of security function activation for a mobile electronic device
FR2847752B1 (en)2002-11-272006-01-13At & T Corp METHOD AND SYSTEM FOR MANAGING THE EXCHANGE OF FILES ATTACHED TO E-MAIL
US7353533B2 (en)2002-12-182008-04-01Novell, Inc.Administration of protection of data accessible by a mobile device
JP4128443B2 (en)2002-12-272008-07-30株式会社野村総合研究所 Data area management method in web browser usage processing system
US7194254B2 (en)*2002-12-302007-03-20Motorola Inc.Apparatus for restricted browser access within a wireless communication device and method therefor
AU2003300431A1 (en)2002-12-312004-07-29Bitfone CorporationManagement of service components installed in an electronic device in a mobile services network
WO2004066156A1 (en)2003-01-202004-08-05Fujitsu LimitedCopy prevention apparatus, copy prevention method, and program for causing computer to execute the method
JP3928561B2 (en)2003-01-232007-06-13ソニー株式会社 Content distribution system, information processing apparatus or information processing method, and computer program
US7779408B1 (en)2003-03-242010-08-17Sprint Spectrum L.P.Method and system for downloading and managing portable applications on a mobile device
US7509651B2 (en)*2003-05-232009-03-24Hewlett-Packard Development Company, L.P.System and method for providing event notifications to information technology resource managers
US7543051B2 (en)2003-05-302009-06-02Borland Software CorporationMethod of non-intrusive analysis of secure and non-secure web application traffic in real-time
AU2003903501A0 (en)2003-07-072003-07-24Commonwealth Scientific And Industrial Research OrganisationA method of forming a reflective authentication device
US20050027862A1 (en)2003-07-182005-02-03Nguyen Tien LeSystem and methods of cooperatively load-balancing clustered servers
US7089594B2 (en)2003-07-212006-08-08July Systems, Inc.Application rights management in a mobile environment
US7574707B2 (en)2003-07-282009-08-11Sap AgInstall-run-remove mechanism
US7515717B2 (en)2003-07-312009-04-07International Business Machines CorporationSecurity containers for document components
US7349913B2 (en)2003-08-212008-03-25Microsoft CorporationStorage platform for organizing, searching, and sharing data
SE527561C2 (en)2003-09-122006-04-11Secured Email Goeteborg AbElectronic mail transmission method in internet environment, involves storing seed for key generation provided from sender's terminal, in receiver's terminal
US20050076085A1 (en)2003-09-182005-04-07Vulcan Portals Inc.Method and system for managing email attachments for an electronic device
US20050063637A1 (en)2003-09-222005-03-24Mershon Jayne L.Connecting a component with an embedded optical fiber
CN1894897A (en)2003-09-292007-01-10瑞姆系统公司Mobility device server
US20050086328A1 (en)2003-10-172005-04-21Landram Fredrick J.Self configuring mobile device and system
US8483227B2 (en)2003-11-202013-07-09International Business Machines CorporationControlling bandwidth reservations method and apparatus
EP2184934B1 (en)2003-12-292012-12-05Telefonaktiebolaget L M Ericsson (PUBL)Method and apparatuses for single sign-on access to a service network through an access network
US9224131B2 (en)2003-12-292015-12-29International Business Machines CorporationSystem and method for facilitating collaboration in a shared email repository
US7720461B2 (en)2004-02-262010-05-18Research In Motion LimitedMobile communications device with security features
US20050193222A1 (en)2004-03-012005-09-01Greene William S.Providing secure data and policy exchange between domains in a multi-domain grid by use of a service ecosystem facilitating uses such as supply-chain integration with RIFD tagged items and barcodes
US7549048B2 (en)2004-03-192009-06-16Microsoft CorporationEfficient and secure authentication of computing systems
US7509672B1 (en)2004-04-012009-03-24Compuware CorporationCross-platform single sign-on data sharing
US7263256B2 (en)2004-04-022007-08-28Samsung Electronics Co., Ltd.Optical connection block, optical module, and optical axis alignment method using the same
US7492946B2 (en)2004-05-242009-02-17Michael James ElderSystem, method and computer program for an integrated digital workflow for processing a paper form
US7631360B2 (en)2004-06-122009-12-08Microsoft CorporationHardware protection
JP2006013747A (en)2004-06-242006-01-12Murata Mach LtdElectronic mail server apparatus and electronic mail network system
EP2264956B1 (en)2004-07-232017-06-14Citrix Systems, Inc.Method for securing remote access to private networks
US20060048142A1 (en)2004-09-022006-03-02Roese John JSystem and method for rapid response network policy implementation
US20060080432A1 (en)2004-09-032006-04-13Spataro Jared MSystems and methods for collaboration
US7949706B2 (en)2004-09-242011-05-24At&T Intellectual Property I, L.P.Automatic electronic publishing
JP2006094258A (en)2004-09-272006-04-06Nippon Telegr & Teleph Corp <Ntt> Terminal device, policy enforcement method thereof, and program thereof
US7721328B2 (en)*2004-10-012010-05-18Salesforce.Com Inc.Application identity design
US8086519B2 (en)*2004-10-142011-12-27Cfph, LlcSystem and method for facilitating a wireless financial transaction
US7109051B2 (en)2004-11-152006-09-19Freescale Semiconductor, Inc.Method of integrating optical devices and electronic devices on an integrated circuit
US20060112428A1 (en)2004-11-232006-05-25Nokia CorporationDevice having a locking feature and a method, means and software for utilizing the feature
JP2006155522A (en)*2004-12-012006-06-15Canon Inc WEB browser operation method and operation device
US7562226B2 (en)2005-01-142009-07-14Citrix Systems, Inc.System and method for permission-based access using a shared account
US20060185004A1 (en)2005-02-112006-08-17Samsung Electronics Co., Ltd.Method and system for single sign-on in a network
US20060256739A1 (en)2005-02-192006-11-16Kenneth SeierFlexible multi-media data management
US8565726B2 (en)2008-11-062013-10-22Mcafee, Inc.System, method and device for mediating connections between policy source servers, corporate repositories, and mobile devices
US20060200814A1 (en)2005-03-022006-09-07Nokia CorporationSoftware distribution with activation control
US7844958B2 (en)2005-03-112010-11-30Aptana, Inc.System and method for creating target byte code
US7472375B2 (en)2005-03-292008-12-30Intel CorporationCreating managed code from native code
US7631297B2 (en)2005-04-052009-12-08International Business Machines CorporationAutonomic computing: management agent utilizing action policy for operation
US7490352B2 (en)2005-04-072009-02-10Microsoft CorporationSystems and methods for verifying trust of executable files
US20060248577A1 (en)2005-04-292006-11-02International Business Machines CorporationUsing SSO processes to manage security credentials in a provisioning management system
US7945788B2 (en)2005-05-032011-05-17Strong Bear L.L.C.Removable drive with data encryption
US20070024646A1 (en)2005-05-232007-02-01Kalle SaarinenPortable electronic apparatus and associated method
US7565689B2 (en)2005-06-082009-07-21Research In Motion LimitedVirtual private network for real-time data
US7591002B2 (en)2005-06-092009-09-15Microsoft CorporationConditional activation of security policies
US7793333B2 (en)2005-06-132010-09-07International Business Machines CorporationMobile authorization using policy based access control
US8010997B2 (en)*2005-06-302011-08-30Microsoft CorporationEnforcing device settings for mobile devices
US20070016771A1 (en)2005-07-112007-01-18Simdesk Technologies, Inc.Maintaining security for file copy operations
US20070016907A1 (en)2005-07-122007-01-18Fabio BenedettiMethod, system and computer program for automatic provisioning of resources to scheduled jobs
US8321953B2 (en)2005-07-142012-11-27Imation Corp.Secure storage device with offline code entry
US9864628B2 (en)2005-08-232018-01-09Blackberry LimitedMethod and system for transferring an application state from a first electronic device to a second electronic device
US20070283324A1 (en)2005-08-302007-12-06Geisinger Nile JSystem and method for creating programs that comprise several execution layers
KR100723700B1 (en)2005-08-312007-05-30에스케이 텔레콤주식회사 Method and system for remotely controlling the operation of mobile communication terminal
US7779458B1 (en)2005-09-202010-08-17Rockwell Collins, Inc.Situation aware mobile location ad hoc firewall
US20070072598A1 (en)2005-09-232007-03-29Coleman David TControlling wireless communication devices with media recording capabilities
GB2430772A (en)2005-10-012007-04-04Knowledge Support Systems LtdUser interface method and apparatus
US7870493B2 (en)2005-10-032011-01-11Microsoft CorporationDistributed clipboard
US8745223B2 (en)2005-10-142014-06-03Psion Inc.System and method of distributed license management
KR101285024B1 (en)2005-10-182013-08-27인터트러스트 테크놀로지즈 코포레이션Methods for digital rights management
US7437755B2 (en)2005-10-262008-10-14Cisco Technology, Inc.Unified network and physical premises access control server
US20070100938A1 (en)2005-10-272007-05-03Bagley Elizabeth VParticipant-centered orchestration/timing of presentations in collaborative environments
WO2007053848A1 (en)2005-11-012007-05-10Mobile Armor, LlcCentralized dynamic security control for a mobile device network
US8305422B2 (en)2005-11-082012-11-06Sharp Kabushiki KaishaCommunication device, communication method, communication system, program, and computer-readable storage medium
US20070248085A1 (en)2005-11-122007-10-25Cranite SystemsMethod and apparatus for managing hardware address resolution
US7921303B2 (en)2005-11-182011-04-05Qualcomm IncorporatedMobile security system and method
US8045958B2 (en)2005-11-212011-10-25Research In Motion LimitedSystem and method for application program operation on a wireless device
TWI405094B (en)2005-11-282013-08-11IbmSystem for preventing unauthorized acquisition of information, and method thereof
US8286002B2 (en)2005-12-022012-10-09Alcatel LucentMethod and apparatus for providing secure remote access to enterprise networks
US20070180509A1 (en)2005-12-072007-08-02Swartz Alon RPractical platform for high risk applications
US20070136471A1 (en)2005-12-122007-06-14Ip3 NetworksSystems and methods for negotiating and enforcing access to network resources
GB2433794B (en)2005-12-212010-08-18Advanced Risc Mach LtdInterrupt controller utiilising programmable priority values
WO2007074420A2 (en)2005-12-262007-07-05Koninklijke Philips Electronics N.V.Method and device for rights management
US7716240B2 (en)2005-12-292010-05-11Nextlabs, Inc.Techniques and system to deploy policies intelligently
US8132242B1 (en)2006-02-132012-03-06Juniper Networks, Inc.Automated authentication of software applications using a limited-use token
US20070226034A1 (en)2006-03-232007-09-27Kyocera Wireless Corp.Wireless communication device meeting scheduler
US7774323B2 (en)2006-03-272010-08-10Sap Portals Israel Ltd.Method and apparatus for delivering managed applications to remote locations
EP2002634B1 (en)2006-03-272014-07-02Telecom Italia S.p.A.System for enforcing security policies on mobile communications devices
US9112897B2 (en)*2006-03-302015-08-18Advanced Network Technology Laboratories Pte Ltd.System and method for securing a network session
US8151323B2 (en)2006-04-122012-04-03Citrix Systems, Inc.Systems and methods for providing levels of access and action control via an SSL VPN appliance
US8181010B1 (en)2006-04-172012-05-15Oracle America, Inc.Distributed authentication user interface system
US7454102B2 (en)2006-04-262008-11-18Honeywell International Inc.Optical coupling structure
US8700772B2 (en)2006-05-032014-04-15Cloud Systems, Inc.System and method for automating the management, routing, and control of multiple devices and inter-device connections
US7890612B2 (en)2006-05-082011-02-15Electro Guard Corp.Method and apparatus for regulating data flow between a communications device and a network
US20070266421A1 (en)2006-05-122007-11-15Redcannon, Inc.System, method and computer program product for centrally managing policies assignable to a plurality of portable end-point security devices over a network
US7574090B2 (en)2006-05-122009-08-11Toshiba America Electronic Components, Inc.Semiconductor device using buried oxide layer as optical wave guides
US7743260B2 (en)2006-05-172010-06-22Richard FetikFirewall+storage apparatus, method and system
US20080046580A1 (en)2006-06-292008-02-21Nokia CorporationAccount creation system and call processing system
JP2008033751A (en)2006-07-312008-02-14Ziosoft IncUpdate method and update system
US20080047006A1 (en)2006-08-212008-02-21Pantech Co., Ltd.Method for registering rights issuer and domain authority in digital rights management and method for implementing secure content exchange functions using the same
US8245285B1 (en)2006-09-222012-08-14Oracle America, Inc.Transport-level web application security on a resource-constrained device
US8327427B2 (en)2006-09-252012-12-04Rockstar Consortium Us LpSystem and method for transparent single sign-on
JP2008096484A (en)2006-10-062008-04-24Sony CorpOptical semiconductor apparatus
JP4959282B2 (en)2006-10-132012-06-20中国電力株式会社 Application operation control system and application operation control method
US9135444B2 (en)2006-10-192015-09-15Novell, Inc.Trusted platform module (TPM) assisted data center management
US8259568B2 (en)2006-10-232012-09-04Mcafee, Inc.System and method for controlling mobile device access to a network
CN101170401B (en)2006-10-272011-02-02鸿富锦精密工业(深圳)有限公司Email encryption/decryption system and its method
US8281299B2 (en)2006-11-102012-10-02Purdue Research FoundationMap-closure: a general purpose mechanism for nonstandard interpretation
GB2446199A (en)2006-12-012008-08-06David IrvineSecure, decentralised and anonymous peer-to-peer network
JP5070835B2 (en)2006-12-262012-11-14日本電気株式会社 Function limiting method for portable terminal and portable terminal
CA2578472C (en)2007-01-122013-01-15Truecontext CorporationMethods and system for orchestrating services and data sharing on mobile devices
JP5133973B2 (en)2007-01-182013-01-30パナソニック株式会社 Obfuscation support device, obfuscation support method, program, and integrated circuit
US8214451B2 (en)2007-01-192012-07-03Alcatel LucentNetwork service version management
US8909702B2 (en)2007-01-292014-12-09Fuji Xerox Co., Ltd.System and method for coordination of devices in a presentation environment
US7644377B1 (en)2007-01-312010-01-05Hewlett-Packard Development Company, L.P.Generating a configuration of a system that satisfies constraints contained in models
US8095517B2 (en)2007-02-082012-01-10Blue Coat Systems, Inc.Method and system for policy-based protection of application data
US8689334B2 (en)2007-02-282014-04-01Alcatel LucentSecurity protection for a customer programmable platform
US20080229117A1 (en)2007-03-072008-09-18Shin Kang GApparatus for preventing digital piracy
JP4973246B2 (en)2007-03-092012-07-11日本電気株式会社 Access right management system, server, and access right management program
WO2008114256A2 (en)2007-03-222008-09-25Neocleus Ltd.Trusted local single sign-on
CN101281461B (en)2007-04-042012-07-04国际商业机器公司Method and device for transfer applying dependent system environment
US8484693B2 (en)2007-04-272013-07-09Gregory W. CoxEfficient policy conflict detection
US20080270240A1 (en)2007-04-302008-10-30Viva ChuSystems and methods of managing tasks assigned to an individual
US20080313257A1 (en)2007-06-152008-12-18Allen James DMethod and Apparatus for Policy-Based Transfer of an Application Environment
US8027518B2 (en)2007-06-252011-09-27Microsoft CorporationAutomatic configuration of devices based on biometric data
US7895409B2 (en)2007-07-302011-02-22Hewlett-Packard Development Company, L.P.Application inspection tool for determining a security partition
EP2188730A4 (en)2007-08-082014-09-17Innopath Software Inc MANAGEMENT AND APPLICATION OF POLICIES IN MOBILE DEVICES
US20090049425A1 (en)2007-08-142009-02-19Aladdin Knowledge Systems Ltd.Code Obfuscation By Reference Linking
US8306509B2 (en)2007-08-312012-11-06At&T Mobility Ii LlcEnhanced messaging with language translation feature
EP2034687B1 (en)2007-09-042012-06-13Research In Motion LimitedSystem and method for processing attachments to messages sent to a mobile device
JP2009070073A (en)2007-09-122009-04-02Sumitomo Electric Ind Ltd Information processing apparatus and agent computer program
US8554176B2 (en)2007-09-182013-10-08Qualcomm IncorporatedMethod and apparatus for creating a remotely activated secure backup service for mobile handsets
US20090100529A1 (en)2007-10-112009-04-16Noam LivnatDevice, system, and method of file-utilization management
WO2009062194A1 (en)2007-11-092009-05-14Proxense, LlcProximity-sensor supporting multiple application services
US8060596B1 (en)2007-12-262011-11-15Symantec CorporationMethods and systems for normalizing data loss prevention categorization information
US20090172657A1 (en)2007-12-282009-07-02Nokia, Inc.System, Method, Apparatus, Mobile Terminal and Computer Program Product for Providing Secure Mixed-Language Components to a System Dynamically
US20090171906A1 (en)2008-01-022009-07-02Research In Motion LimitedSystem and method for providing information relating to an email being provided to an electronic device
ES2963388T3 (en)2008-01-162024-03-26Blackberry Ltd Secured Presentation Layer Virtualization for Handheld Wireless Communication Devices
WO2009094372A1 (en)2008-01-222009-07-30Authentium, Inc.System and method for protecting data accessed through a network connection
US20090199178A1 (en)2008-02-012009-08-06Microsoft CorporationVirtual Application Management
CA2700689A1 (en)2008-02-152009-08-20Citrix Systems, Inc.Systems and methods for secure handling of secure attention sequences
US9185554B2 (en)2008-02-152015-11-10Appcentral, Inc.System and methods to store, retrieve, manage, augment and monitor applications on appliances
JPWO2009104721A1 (en)2008-02-212011-06-23日本電気株式会社 Mobile terminal context efficiency utilization method and system
US8078713B1 (en)2008-03-052011-12-13Full Armor CorporationDelivering policy settings with virtualized applications
US9576157B2 (en)2008-04-022017-02-21Yougetitback LimitedMethod for mitigating the unauthorized use of a device
US20090319772A1 (en)2008-04-252009-12-24Netapp, Inc.In-line content based security for data at rest in a network storage system
CN101572678B (en)2008-04-302012-09-19北京明朝万达科技有限公司Mail attachment transparent privacy control method
US8156204B2 (en)2008-05-072012-04-10Chalk Media Service Corp.Method for enabling bandwidth management for mobile content delivery
US8549657B2 (en)2008-05-122013-10-01Microsoft CorporationOwner privacy in a shared mobile device
CN101588353B (en)2008-05-212012-09-19闪联信息技术工程中心有限公司Method, system and equipment for sharing files
JP5326363B2 (en)2008-05-302013-10-30株式会社リコー Image forming apparatus, authentication control method, and program
US8406748B2 (en)2009-01-282013-03-26Headwater Partners I LlcAdaptive ambient services
US8204196B2 (en)2008-06-252012-06-19International Business Machines CorporationNotification to absent teleconference invitees
JP5577527B2 (en)*2008-06-252014-08-27日本電気株式会社 Information processing system, personal information device, and access management method
US8117589B2 (en)2008-06-262012-02-14Microsoft CorporationMetadata driven API development
US8156442B2 (en)2008-06-302012-04-10Nokia CorporationLife recorder and sharing
US8584114B2 (en)2008-06-302013-11-12Mo'minis LtdMethod of generating and distributing a computer application
US8862672B2 (en)2008-08-252014-10-14Microsoft CorporationContent sharing and instant messaging
CN101350814A (en)2008-08-262009-01-21成都卫士通信息产业股份有限公司Safety remote access technology and gateway thereof
CN101662765B (en)2008-08-292013-08-07深圳富泰宏精密工业有限公司Encryption system and method of short message of mobile telephone
US8365183B2 (en)2008-09-022013-01-29Ca, Inc.System and method for dynamic resource provisioning for job placement
US8387110B1 (en)2010-02-102013-02-26Socialware, Inc.Method, system and computer program product for tagging content on uncontrolled web application
US9495538B2 (en)2008-09-252016-11-15Symantec CorporationGraduated enforcement of restrictions according to an application's reputation
US20100083358A1 (en)2008-09-292010-04-01Perfios Software Solutions Pvt. LtdSecure Data Aggregation While Maintaining Privacy
US20120137364A1 (en)2008-10-072012-05-31Mocana CorporationRemote attestation of a mobile device
US20100125730A1 (en)2008-11-172010-05-20David DodgsonBlock-level data storage security system
US20100146582A1 (en)2008-12-042010-06-10Dell Products L.P.Encryption management in an information handling system
US8245223B2 (en)2008-12-232012-08-14Microsoft CorporationNetworked deployment of multi-application customizations
US8505078B2 (en)2008-12-282013-08-06Qualcomm IncorporatedApparatus and methods for providing authorized device access
US8856909B1 (en)2009-01-232014-10-07Juniper Networks, Inc.IF-MAP provisioning of resources and services
US20100228961A1 (en)2009-03-032010-09-09Erf Wireless, Inc.Hierarchical secure networks
US20100228825A1 (en)2009-03-062010-09-09Microsoft CorporationSmart meeting room
US20100235216A1 (en)2009-03-162010-09-16Microsoft CorporationIntegration of pre-meeting and post-meeting experience into a meeting lifecycle
CN101854340B (en)2009-04-032015-04-01瞻博网络公司Behavior based communication analysis carried out based on access control information
US8666367B2 (en)2009-05-012014-03-04Apple Inc.Remotely locating and commanding a mobile device
US8660530B2 (en)2009-05-012014-02-25Apple Inc.Remotely receiving and communicating commands to a mobile device for execution by the mobile device
CN101888597A (en)2009-05-112010-11-17河北省烟草公司张家口市公司Mobile OA system of mobile phone terminal
EP2251986A1 (en)2009-05-152010-11-17Nxp B.V.A near field communication device
US9858925B2 (en)2009-06-052018-01-02Apple Inc.Using context information to facilitate processing of commands in a virtual assistant
US9141412B2 (en)2009-06-162015-09-22Microsoft Technology Licensing, LlcTerminal services application virtualization for compatibility
US9621516B2 (en)2009-06-242017-04-11Vmware, Inc.Firewall configured with dynamic membership sets representing machine attributes
US8839422B2 (en)2009-06-302014-09-16George Mason Research Foundation, Inc.Virtual browsing environment
US8048795B2 (en)2009-07-102011-11-01Taiwan Semiconductor Manufacturing Company, Ltd.Self-assembly pattern for semiconductor integrated circuit
CA2698066A1 (en)2009-07-312011-01-31Nitobi Software Inc.System and method for remotely compiling multi-platform native applications for mobile devices
US8281381B2 (en)2009-08-032012-10-02Novell, Inc.Techniques for environment single sign on
WO2011018827A1 (en)2009-08-132011-02-17株式会社日立製作所System and method for evaluating adequacy of applications in execution environments
WO2011026530A1 (en)2009-09-072011-03-10Tomtom International B.V.Navigation apparatus and method of supporting hands-free voice communication
US8200626B1 (en)2009-09-182012-06-12Sprint Communications Company L.P.Mobile device file management
US8972878B2 (en)2009-09-212015-03-03Avaya Inc.Screen icon manipulation by context and frequency of Use
JP4527802B2 (en)2009-10-192010-08-18日本電気株式会社 Computer system
US8850423B2 (en)2009-10-292014-09-30International Business Machines CorporationAssisting server migration
EP2334034B1 (en)2009-11-112018-06-27BlackBerry LimitedUsing a trusted token and push for validating the request for single sign on
US8595284B2 (en)2009-12-142013-11-26Samsung Electronics Co., LtdWeb application script migration
US9244533B2 (en)2009-12-172016-01-26Microsoft Technology Licensing, LlcCamera navigation for presentations
US8495746B2 (en)2009-12-182013-07-23Verizon Patent And Licensing Inc.Apparatuses, methods and systems of an application security management platform
JP2011138446A (en)2009-12-302011-07-14Takashi OshitaFile encryption system which easily operable of encrypted independent file group on dedicated operation screen
WO2011091056A1 (en)2010-01-192011-07-28Servicemesh, Inc.System and method for a cloud computing abstraction layer
WO2011103385A1 (en)2010-02-222011-08-25Avaya Inc.Secure, policy-based communications security and file sharing across mixed media, mixed-communications modalities and extensible to cloud computing such as soa
US20110208797A1 (en)2010-02-222011-08-25Full Armor CorporationGeolocation-Based Management of Virtual Applications
JP2011191897A (en)2010-03-122011-09-29Murata Machinery LtdImage taking out management system, portable image display terminal, and image management device
US20110252459A1 (en)2010-04-122011-10-13Walsh Robert EMultiple Server Access Management
US20110314534A1 (en)2010-04-142011-12-22Lee JamesSecured Execution Environments and Methods
US9282097B2 (en)2010-05-072016-03-08Citrix Systems, Inc.Systems and methods for providing single sign on access to enterprise SAAS and cloud hosted applications
US9461996B2 (en)2010-05-072016-10-04Citrix Systems, Inc.Systems and methods for providing a single click access to enterprise, SAAS and cloud hosted application
EP2569705A4 (en)2010-05-092014-05-14Citrix Systems Inc SYSTEMS AND METHODS FOR CREATING AND DELIVERING CRYPTED VIRTUAL DISKS
US20110296333A1 (en)2010-05-252011-12-01Bateman Steven SUser interaction gestures with virtual keyboard
US8972980B2 (en)2010-05-282015-03-03Bromium, Inc.Automated provisioning of secure virtual execution environment using virtual machine templates based on requested activity
US8127350B2 (en)2010-06-302012-02-28Juniper Networks, Inc.Multi-service VPN network client for mobile device
US9560036B2 (en)2010-07-082017-01-31International Business Machines CorporationCross-protocol federated single sign-on (F-SSO) for cloud enablement
US8474017B2 (en)2010-07-232013-06-25Verizon Patent And Licensing Inc.Identity management and single sign-on in a heterogeneous composite service scenario
JP5732767B2 (en)2010-07-262015-06-10富士通株式会社 PROCESSING DEVICE, PROCESSING METHOD, PROCESSING PROGRAM, COMPUTER-READABLE RECORDING MEDIUM CONTAINING THE PROGRAM
US8880580B2 (en)2010-07-282014-11-04Admiemobile LlcSystems and methods for establishing and maintaining virtual computing clouds
US9936333B2 (en)2010-08-102018-04-03Microsoft Technology Licensing, LlcLocation and contextual-based mobile application promotion and delivery
US8539561B2 (en)2010-08-242013-09-17International Business Machines CorporationSystems and methods to control device endpoint behavior using personae and policies
US9582673B2 (en)2010-09-272017-02-28Microsoft Technology Licensing, LlcSeparation of duties checks from entitlement sets
JP5620781B2 (en)2010-10-142014-11-05キヤノン株式会社 Information processing apparatus, control method thereof, and program
US20120110317A1 (en)2010-10-292012-05-03Verizon Patent And Licensing Inc.Content download manager
KR20120057734A (en)2010-11-222012-06-07삼성전자주식회사Server, device accessing server and control method
US9219744B2 (en)2010-12-082015-12-22At&T Intellectual Property I, L.P.Mobile botnet mitigation
US8918834B1 (en)2010-12-172014-12-23Amazon Technologies, Inc.Creating custom policies in a remote-computing environment
AU2011202838B2 (en)2010-12-212014-04-10Lg Electronics Inc.Mobile terminal and method of controlling a mode screen display therein
US9110743B2 (en)2010-12-212015-08-18Microsoft Technology Licensing, LlcExtensible system action for sharing while remaining in context
US8931037B2 (en)2010-12-272015-01-06Microsoft CorporationPolicy-based access to virtualized applications
US20120174237A1 (en)2010-12-312012-07-05Openpeak Inc.Location aware self-locking system and method for a mobile device
CN102591802A (en)2011-01-052012-07-18广州市国迈科技有限公司USB flash disk with stored files openable while irreproducible
US9612855B2 (en)2011-01-102017-04-04International Business Machines CorporationVirtual machine migration based on the consent by the second virtual machine running of the target host
US9306933B2 (en)2011-02-112016-04-05Mocana CorporationEnsuring network connection security between a wrapped app and a remote server
US8549656B2 (en)2011-02-112013-10-01Mocana CorporationSecuring and managing apps on a device
US20120209949A1 (en)2011-02-142012-08-16Alexandros DeliyannisMethods and apparatus to monitor media content
US8996807B2 (en)2011-02-152015-03-31Intelligent Intellectual Property Holdings 2 LlcSystems and methods for a multi-level cache
US9544396B2 (en)2011-02-232017-01-10Lookout, Inc.Remote application installation and control for a mobile device
US20120233130A1 (en)2011-03-112012-09-13Nagarajan VedachalamSystem and method for archiving emails
US20120238206A1 (en)2011-03-142012-09-20Research In Motion LimitedCommunications device providing near field communication (nfc) secure element disabling features related methods
US8955142B2 (en)2011-03-212015-02-10Mocana CorporationSecure execution of unsecured apps on a device
US8812868B2 (en)2011-03-212014-08-19Mocana CorporationSecure execution of unsecured apps on a device
WO2012128682A1 (en)2011-03-222012-09-27Telefonaktiebolaget L M Ericsson (Publ)Methods for exchanging user profile, profile mediator device, agents, computer programs and computer program products
US20120246191A1 (en)2011-03-242012-09-27True XiongWorld-Wide Video Context Sharing
US8621620B2 (en)2011-03-292013-12-31Mcafee, Inc.System and method for protecting and securing storage devices using below-operating system trapping
US20120250106A1 (en)2011-03-302012-10-04Infosys Technologies Ltd.Method, device and system for updating an application on a mobile device
US8458802B2 (en)2011-04-022013-06-04Intel CorporationMethod and device for managing digital usage rights of documents
US8898629B2 (en)2011-04-062014-11-25Media Direct, Inc.Systems and methods for a mobile application development and deployment platform
EP2523107B1 (en)2011-04-192018-11-07LG Electronics Inc.Mobile terminal and system for managing applications using the same
KR20120118819A (en)2011-04-192012-10-29엘지전자 주식회사Mobile terminal and system for managing applications using the same
US9094400B2 (en)2011-04-272015-07-28International Business Machines CorporationAuthentication in virtual private networks
US8839395B2 (en)2011-05-132014-09-16Cch IncorporatedSingle sign-on between applications
US8443456B2 (en)2011-05-202013-05-14Citrix Systems, Inc.Providing multiple layers of security to file storage by an external storage provider
US8687814B2 (en)2011-05-202014-04-01Citrix Systems, Inc.Securing encrypted virtual hard disks
US20120311695A1 (en)*2011-05-312012-12-06Kohlenberg Tobias MMethod and apparatus for dynamic modification of authentication requirements of a processing system
HK1201093A1 (en)2011-06-012015-08-21安全第一公司Systems and methods for secure distributed storage
US9201634B2 (en)2011-06-092015-12-01Samsung Electronics Co., LtdMethod and system for controlling user experience with an application on a client device
US10333711B2 (en)2011-06-172019-06-25Microsoft Technology Licensing, LlcControlling access to protected objects
EP2727042B1 (en)2011-07-012016-04-06Fiberlink Communications CorporationRules based actions for mobile device management
US20130013727A1 (en)2011-07-052013-01-10Robin Edward WalkerSystem and method for providing a mobile persona environment
KR101844289B1 (en)2011-07-062018-04-02삼성전자 주식회사Method and apparatus for managing security of mobile terminal based on location information in mobile communication system
US20130014267A1 (en)2011-07-072013-01-10Farrugia Augustin JComputer protocol generation and obfuscation
US9369307B2 (en)2011-07-122016-06-14Bank Of America CorporationOptimized service integration
US9015320B2 (en)2011-07-122015-04-21Bank Of America CorporationDynamic provisioning of service requests
US8719919B2 (en)2011-07-122014-05-06Bank Of America CorporationService mediation framework
US9424144B2 (en)2011-07-272016-08-23Microsoft Technology Licensing, LlcVirtual machine migration to minimize packet loss in virtualized network
US9942385B2 (en)2011-08-042018-04-10International Business Machines CorporationSystem and method for preventing and/or limiting use of a mobile device
US8949929B2 (en)2011-08-102015-02-03Qualcomm IncorporatedMethod and apparatus for providing a secure virtual environment on a mobile device
WO2013020177A1 (en)*2011-08-112013-02-14Cocoon Data Holdings LimitedSystem and method for accessing securely stored data
DE112012003731T5 (en)2011-09-092014-08-07Stoneware Inc. Method and apparatus for key sharing in conjunction with the Remote Desktop Protocol
US9652738B2 (en)2011-09-142017-05-16Avaya Inc.System and method for a communication session identifier
US8825863B2 (en)2011-09-202014-09-02International Business Machines CorporationVirtual machine placement within a server farm
US8554179B2 (en)2011-09-232013-10-08Blackberry LimitedManaging mobile device applications
US9451451B2 (en)2011-09-302016-09-20Tutela Technologies Ltd.System for regulating wireless device operations in wireless networks
US9544158B2 (en)2011-10-052017-01-10Microsoft Technology Licensing, LlcWorkspace collaboration via a wall-type computing device
US8682973B2 (en)2011-10-052014-03-25Microsoft CorporationMulti-user and multi-device collaboration
US9131147B2 (en)2011-10-072015-09-08Fuji Xerox Co., Ltd.System and method for detecting and acting on multiple people crowding a small display for information sharing
US9280377B2 (en)2013-03-292016-03-08Citrix Systems, Inc.Application with multiple operation modes
US8971842B2 (en)2011-10-122015-03-03Verizon Patent And Licensing Inc.Enterprise mobile application store
US20130097660A1 (en)2011-10-172013-04-18Mcafee, Inc.System and method for whitelisting applications in a mobile network environment
US20130097296A1 (en)2011-10-182013-04-18Telefonaktiebolaget L M Ericsson (Publ)Secure cloud-based virtual machine migration
KR101834995B1 (en)2011-10-212018-03-07삼성전자주식회사Method and apparatus for sharing contents between devices
US8347349B1 (en)*2011-10-282013-01-01Google Inc.Configuring browser policy settings on client computing devices
US9106650B2 (en)2011-11-092015-08-11Microsoft Technology Licensing, LlcUser-driven access control
US8990558B2 (en)2011-11-092015-03-24Safer Point LtdSecuring information in a cloud computing system
WO2013070126A1 (en)2011-11-102013-05-16Telefonaktiebolaget L M Ericsson (Publ)Policy controlled preload and consumption of software application
US20130144934A1 (en)2011-12-012013-06-06Microsoft CorporationWeb Content Targeting Based on Client Application Availability
US8935375B2 (en)2011-12-122015-01-13Microsoft CorporationIncreasing availability of stateful applications
US20130305354A1 (en)2011-12-232013-11-14Microsoft CorporationRestricted execution modes
US9507630B2 (en)2012-02-092016-11-29Cisco Technology, Inc.Application context transfer for distributed computing resources
US8793344B2 (en)2012-02-172014-07-29Oracle International CorporationSystem and method for generating a response plan for a hypothetical event
US8918881B2 (en)2012-02-242014-12-23Appthority, Inc.Off-device anti-malware protection for mobile devices
US9323563B2 (en)2012-02-282016-04-26Red Hat Israel, Ltd.Determining virtual machine migration in view of a migration rule
US9047107B2 (en)2012-02-292015-06-02Red Hat, Inc.Applying a custom security type label to multi-tenant applications of a node in a platform-as-a-service environment
EP2661095A4 (en)2012-03-052015-07-22Mtek C & K Co LtdMethod and apparatus for controlling automatic interworking of multiple devices
US20130237152A1 (en)2012-03-092013-09-12Kulveer TaggarMethods and systems for hardware and software related to a near field communications task launcher
US20130260730A1 (en)2012-03-282013-10-03Enterproid Hk LtdCustom application container for mobile operating systems and/or devices
CN102662840A (en)*2012-03-312012-09-12天津大学Automatic detecting system and method for extension behavior of Firefox browser
JP5697626B2 (en)*2012-04-032015-04-08株式会社野村総合研究所 Access authority management system
US20130268676A1 (en)2012-04-062013-10-10Telefonaktiebolaget L M Ericsson (Publ)Application programming interface routing system and method of operating the same
US20130283335A1 (en)2012-04-192013-10-24AppSense, Inc.Systems and methods for applying policy wrappers to computer applications
US9253209B2 (en)2012-04-262016-02-02International Business Machines CorporationPolicy-based dynamic information flow control on mobile devices
US9112918B2 (en)2012-04-302015-08-18Verizon Patent And Licensing Inc.Multi-mode user device and network-based control and monitoring
CA2872051A1 (en)2012-05-012013-11-07Agora Mobile Inc.System and method for providing an application development and distribution social platform
US8849904B2 (en)2012-05-172014-09-30Cloudflare, Inc.Incorporating web applications into web pages at the network level
US20130347130A1 (en)2012-06-082013-12-26BlueboxMethods and apparatus for dynamically providing modified versions of electronic device applications
US20140007215A1 (en)2012-06-152014-01-02Lockheed Martin CorporationMobile applications platform
US8713633B2 (en)2012-07-132014-04-29Sophos LimitedSecurity access protection for user data stored in a cloud computing facility
US20140047413A1 (en)2012-08-092014-02-13Modit, Inc.Developing, Modifying, and Using Applications
US9032506B2 (en)2012-08-092015-05-12Cisco Technology, Inc.Multiple application containerization in a single container
US8850434B1 (en)2012-09-142014-09-30Adaptive Computing Enterprises, Inc.System and method of constraining auto live migration of virtual machines using group tags
US9507949B2 (en)*2012-09-282016-11-29Intel CorporationDevice and methods for management and access of distributed data sources
US20140109176A1 (en)2012-10-152014-04-17Citrix Systems, Inc.Configuring and providing profiles that manage execution of mobile applications
EP2909715B1 (en)2012-10-162022-12-14Citrix Systems, Inc.Application wrapping for application management framework
US9355253B2 (en)2012-10-182016-05-31Broadcom CorporationSet top box architecture with application based security definitions
US8875304B2 (en)2012-11-082014-10-28International Business Machines CorporationApplication and data removal system
US20140149599A1 (en)2012-11-292014-05-29Ricoh Co., Ltd.Unified Application Programming Interface for Communicating with Devices and Their Clouds
US9326145B2 (en)2012-12-162016-04-26Aruba Networks, Inc.System and method for application usage controls through policy enforcement
US8910262B2 (en)2012-12-212014-12-09Cellco PartnershipSupporting multiple messaging services on mobile devices in a single user experience
US9535674B2 (en)2012-12-212017-01-03Bmc Software, Inc.Application wrapping system and method
US9374369B2 (en)2012-12-282016-06-21Lookout, Inc.Multi-factor authentication and comprehensive login system for client-server networks
US9094445B2 (en)2013-03-152015-07-28Centripetal Networks, Inc.Protecting networks from cyber attacks and overloading
US9355223B2 (en)2013-03-292016-05-31Citrix Systems, Inc.Providing a managed browser
US9455886B2 (en)2013-03-292016-09-27Citrix Systems, Inc.Providing mobile device management functionalities
US9369449B2 (en)2013-03-292016-06-14Citrix Systems, Inc.Providing an enterprise application store
US10284627B2 (en)2013-03-292019-05-07Citrix Systems, Inc.Data management for an application with multiple operation modes
WO2014171938A1 (en)2013-04-172014-10-23Empire Technology Development, LlcDatacenter border-issued analytics for monitoring federated services
TWI499932B (en)2013-07-172015-09-11Ind Tech Res InstMethod for application management, corresponding system, and user device
US9356895B2 (en)2014-05-072016-05-31Mitake Information CorporationMessage transmission system and method for a structure of a plurality of organizations

Patent Citations (294)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7043453B2 (en)1994-11-232006-05-09Contentguard Holdings, Inc.Method and system for conducting transactions between repositories using a repository transaction protocol
US5805803A (en)1997-05-131998-09-08Digital Equipment CorporationSecure web tunnel
WO1999014652A1 (en)1997-09-161999-03-25Microsoft CorporationEncrypting file system and method
US6151606A (en)1998-01-162000-11-21Visto CorporationSystem and method for using a workspace data manager to access, manipulate and synchronize network data
US6154172A (en)1998-03-312000-11-28Piccionelli; Gregory A.System and process for limiting distribution of information on a communication network based on geographic location
US20090178111A1 (en)1998-10-282009-07-09Bea Systems, Inc.System and method for maintaining security in a distributed computer network
US6609198B1 (en)1999-08-052003-08-19Sun Microsystems, Inc.Log-on service providing credential level change without loss of session continuity
US7596593B2 (en)1999-09-072009-09-29Citrix Systems, LlcMethods and apparatus for efficiently transmitting interactive application data between a client and server using markup language
US7240015B1 (en)1999-09-172007-07-03Mitel Networks Corporation And The University Of OttawaPolicy representations and mechanisms for the control of software
US8296239B2 (en)2000-03-102012-10-23Sony CorporationData distribution system and method of same, data processing apparatus and method of same, and data recording medium
US6859879B2 (en)2000-05-262005-02-22International Business Machine CorporationMethod and system for secure pervasive access
US20040010579A1 (en)2000-08-312004-01-15Esko FreeseWireless device management
US20060161635A1 (en)2000-09-072006-07-20Sonic SolutionsMethods and system for use in network management of content
US6883098B1 (en)2000-09-202005-04-19International Business Machines CorporationMethod and computer system for controlling access by applications to this and other computer systems
US20020112047A1 (en)2000-12-052002-08-15Rakesh KushwahaSystem and method for wireless data terminal management using general packet radio service network
US20080214300A1 (en)2000-12-072008-09-04IgtMethods for electronic data security and program authentication
US20040083273A1 (en)2001-01-182004-04-29Madison Justin PaulMethod and system for managing digital content, including streaming media
US20040230807A1 (en)2001-02-122004-11-18Baird Leemon C.Apparatus and method for authenticating access to a network resource
US20030046366A1 (en)2001-02-132003-03-06Shishir PardikarSystem and method for providing transparent access to distributed authoring and versioning files including encrypted files
US20030037103A1 (en)2001-03-142003-02-20Nokia CorporationRealization of presence management
WO2002084460A2 (en)2001-04-122002-10-24The Regents Of The University Of MichiganMethod and system to maintain portable computer data secure and authentication token for use therein
US20030031319A1 (en)2001-06-132003-02-13Miki AbeData transfer system, data transfer apparatus, data recording apparatus, edit controlling method and data processing method
US7340772B2 (en)2001-06-132008-03-04Citrix Systems, Inc.Systems and methods for continuing an operation interrupted from a reconnection between a client and server
US6621766B2 (en)2001-08-012003-09-16Fossil, Inc.Flexible timepiece in multiple environments
US20040205233A1 (en)2001-08-292004-10-14Dunk Craig A.System and method for addressing a mobile device in an ip-based wireless network
US20110208838A1 (en)2001-11-022011-08-25Juniper Networks, Inc.Method and system for providing secure access to private networks with client redirection
US7159120B2 (en)2001-11-192007-01-02Good Technology, Inc.Method and system for protecting data within portable electronic devices
US7950066B1 (en)2001-12-212011-05-24Guardian Data Storage, LlcMethod and system for restricting use of a clipboard application
US20030131245A1 (en)2002-01-042003-07-10Michael LindermanCommunication security system
US20040111640A1 (en)2002-01-082004-06-10Baum Robert T.IP based security applications using location, port and/or device identifier information
EP1465039A1 (en)2002-01-082004-10-06NTT DoCoMo, Inc.Content delivery method and content delivery system
US20040006706A1 (en)*2002-06-062004-01-08Ulfar ErlingssonMethods and systems for implementing a secure application execution environment using derived user accounts for internet content
US8012219B2 (en)2002-08-092011-09-06Visto CorporationSystem and method for preventing access to data on a compromised remote device
US20060147043A1 (en)2002-09-232006-07-06Credant Technologies, Inc.Server, computer memory, and method to support security policy maintenance and distribution
US20060242685A1 (en)2002-09-232006-10-26Credant Technologies, Inc.System and method for distribution of security policies for mobile devices
US7254831B2 (en)2002-12-042007-08-07Microsoft CorporationSharing a sign-in among software applications having secured features
US8332464B2 (en)2002-12-132012-12-11Anxebusiness Corp.System and method for remote network access
US20080134292A1 (en)2003-01-082008-06-05Ido ArielExtending user relationships
US20080052395A1 (en)2003-02-282008-02-28Michael WrightAdministration of protection of data accessible by a mobile device
US20060094400A1 (en)2003-02-282006-05-04Brent BeachemSystem and method for filtering access points presented to a user and locking onto an access point
US20060120526A1 (en)2003-02-282006-06-08Peter BoucherAccess control to files based on source information
US7526800B2 (en)2003-02-282009-04-28Novell, Inc.Administration of protection of data accessible by a mobile device
US20050055578A1 (en)2003-02-282005-03-10Michael WrightAdministration of protection of data accessible by a mobile device
WO2004107646A1 (en)2003-05-142004-12-09Threatguard, Inc.System and method for application-level virtual private network
US20050097608A1 (en)2003-10-302005-05-05Xerox CorporationMultimedia communications/collaboration hub
US7415498B2 (en)2003-12-102008-08-19International Business Machines CorporationTime limited collaborative community role delegation policy
US20050172241A1 (en)2004-01-082005-08-04International Business Machines CorporationSystem and method for improved direct system clipboard
US7269605B1 (en)2004-02-132007-09-11Avidian TechnologiesPersonal information manager data synchronization and augmentation
GB2411320A (en)2004-02-232005-08-24Nec CorpAccess control management in a terminal device
US8560709B1 (en)2004-02-252013-10-15F5 Networks, Inc.System and method for dynamic policy based access over a virtual private network
US7599991B2 (en)2004-03-102009-10-06Microsoft CorporationRules interface for implementing message rules on a mobile computing device
US20050255838A1 (en)2004-04-302005-11-17Adams Neil PSystem and method for handling data transfers
US20050273592A1 (en)2004-05-202005-12-08International Business Machines CorporationSystem, method and program for protecting communication
US7966323B2 (en)2004-09-132011-06-21Research In Motion LimitedEnabling category-based filtering
US20080066020A1 (en)2004-09-162008-03-13Boss Gregory JSystem and Method to Capture and Manage Input Values for Automatic Form Fill
US8463946B2 (en)2004-09-172013-06-11Caterpillar Inc.Method for automatic radio operational mode selection
US20060117104A1 (en)2004-09-172006-06-01Fujitsu LimitedSetting information distribution apparatus, method, program, and medium, authentication setting transfer apparatus, method, program, and medium, and setting information reception program
US20060075123A1 (en)2004-09-272006-04-06Citrix Systems, Inc.System and method for managing virtual ip addresses
US20060085826A1 (en)2004-10-182006-04-20Funk James MAggregated program guide for download and view video on demand service
US20090228714A1 (en)2004-11-182009-09-10Biogy, Inc.Secure mobile device with online vault
US7496954B1 (en)2004-11-222009-02-24Sprint Communications Company L.P.Single sign-on system and method
US20120290694A9 (en)2004-12-072012-11-15Brett MarlNetwork administration tool
US7490073B1 (en)2004-12-212009-02-10Zenprise, Inc.Systems and methods for encoding knowledge for automated management of software application deployments
US7788536B1 (en)2004-12-212010-08-31Zenprise, Inc.Automated detection of problems in software application deployments
US7865888B1 (en)2004-12-212011-01-04Zenprise, Inc.Systems and methods for gathering deployment state for automated management of software application deployments
US20060141985A1 (en)2004-12-232006-06-29Motorola, Inc.Dynamic management for interface access permissions
US7788535B2 (en)2005-01-282010-08-31Nxp B.V.Means and method for debugging
US20060224742A1 (en)2005-02-282006-10-05Trust DigitalMobile data security system and methods
US8214887B2 (en)2005-03-202012-07-03Actividentity (Australia) Pty Ltd.Method and system for providing user access to a secure application
US7697737B2 (en)2005-03-252010-04-13Northrop Grumman Systems CorporationMethod and system for providing fingerprint enabled wireless add-on for personal identification number (PIN) accessible smartcards
US20060225142A1 (en)2005-04-052006-10-05Cisco Technology, Inc. (A California Corporation)Method and electronic device for triggering zeroization in a electronic device
US20070056043A1 (en)2005-05-192007-03-08Richard OnyonRemote cell phone auto destruct
US7970386B2 (en)2005-06-032011-06-28Good Technology, Inc.System and method for monitoring and maintaining a wireless device
US20070038764A1 (en)2005-06-072007-02-15AlcatelNetwork equipment for supplying multimode mobile terminals with data necessary for automatically selecting radio access network interfaces during service sessions
US20100124196A1 (en)2005-06-292010-05-20Jumpstart Wireless CorporationSystem and method for dynamic automatic communication path selection, distributed device synchronization and task delegation
US7529923B2 (en)2005-06-302009-05-05Intel CorporationOperating system mode transfer
US20070005713A1 (en)2005-07-012007-01-04Levasseur ThierrySecure electronic mail system
US20070011749A1 (en)2005-07-112007-01-11Simdesk TechnologiesSecure clipboard function
US20120109384A1 (en)2005-08-192012-05-03Nexstep, Inc.Consumer electronic registration, control and support concierge device and method
US20070049297A1 (en)2005-08-292007-03-01Janakiraman GopalanSystem and method for locating mobile devices through a direct-connection protocol
US20070074033A1 (en)2005-09-292007-03-29Research In Motion LimitedAccount management in a system and method for providing code signing services
US8037421B2 (en)2005-10-112011-10-11Research In Motion LimitedSystem and method for organizing application indicators on an electronic device
US20070109983A1 (en)2005-11-112007-05-17Computer Associates Think, Inc.Method and System for Managing Access to a Wireless Network
US20070156897A1 (en)2005-12-292007-07-05Blue JungleEnforcing Control Policies in an Information Management System
US20090221278A1 (en)2005-12-302009-09-03Telecom Italia S.P.A.Method for Customizing the Operation of a Telephonic Terminal
US20070204153A1 (en)2006-01-042007-08-30Tome Agustin JTrusted host platform
US20070204166A1 (en)2006-01-042007-08-30Tome Agustin JTrusted host platform
US20070180447A1 (en)2006-01-242007-08-02Citrix Systems, Inc.Methods and systems for interacting, via a hypermedium page, with a virtual machine
US20070198656A1 (en)2006-01-242007-08-23Citrix Systems, Inc.Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment
US8051180B2 (en)2006-01-242011-11-01Citrix Systems, Inc.Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment
US20070186106A1 (en)2006-01-262007-08-09Ting David MSystems and methods for multi-factor authentication
US20070199051A1 (en)2006-02-152007-08-23Microsoft CorporationSecurely hosting a webbrowser control in a managed code environment
US20070214272A1 (en)2006-03-072007-09-13Novell, Inc.Light-weight multi-user browser
US20070226773A1 (en)2006-03-212007-09-27Novell, Inc.System and method for using sandboxes in a managed shell
US20070226225A1 (en)2006-03-222007-09-27Yiu Timothy CMobile collaboration and communication system
WO2007113709A1 (en)2006-03-302007-10-11Koninklijke Philips Electronics N.V.Method and apparatus for assigning an application to a security restriction
US20110179484A1 (en)2006-04-062011-07-21Juniper Networks, Inc.Malware detection system and method for mobile platforms
US20080235760A1 (en)2006-05-022008-09-25International Business Machines CorporationConfidential Content Reporting System and Method with Electronic Mail Verification Functionality
US8085891B2 (en)2006-05-292011-12-27Research In Motion LimitedSystem and method for management of mobile device communication
US20080027982A1 (en)2006-07-272008-01-31Ebay Inc.Indefinite caching expiration techniques
US20080127292A1 (en)2006-08-042008-05-29Apple Computer, Inc.Restriction of program process capabilities
US20080047015A1 (en)2006-08-082008-02-21Andrew CornwallMethod to provide a secure virtual machine launcher
US20080209506A1 (en)2006-08-142008-08-28Quantum Secure, Inc.Physical access control and security monitoring system utilizing a normalized data format
US20080133729A1 (en)2006-08-172008-06-05Neustar, Inc.System and method for managing domain policy for interconnected communication networks
US20080070495A1 (en)2006-08-182008-03-20Michael StricklenMobile device management
US20080066177A1 (en)2006-09-082008-03-13International Business Machines CorporationMethods, systems, and computer program products for implementing inter-process integrity serialization
US20120079475A1 (en)2006-11-012012-03-29Hicks Iii John AlsonLife Cycle Management of User-Selected Applications on Wireless Communications Devices
US8126128B1 (en)2006-11-012012-02-28At&T Intellectual Property I, LpLife cycle management of user-selected applications on wireless communications devices
US8095786B1 (en)2006-11-092012-01-10Juniper Networks, Inc.Application-specific network-layer virtual private network connections
US8365258B2 (en)2006-11-162013-01-29Phonefactor, Inc.Multi factor authentication
US20080141335A1 (en)2006-12-082008-06-12Novell, Inc.Provisioning software with policy-appropriate capabilities
US20110225417A1 (en)2006-12-132011-09-15Kavi MaharajhDigital rights management in a mobile environment
US20080163286A1 (en)2006-12-292008-07-03Echostar Technologies CorporationControlling access to content and/or services
WO2008086611A1 (en)2007-01-192008-07-24Research In Motion LimitedSelectively wiping a remote device
US20120117622A1 (en)2007-02-052012-05-10Kaj GronholmDynamic network access control method and apparatus
US20100325097A1 (en)2007-02-072010-12-23International Business Machines CorporationNon-Invasive Usage Tracking, Access Control, Policy Enforcement, Audit Logging, and User Action Automation On Software Applications
US20080196038A1 (en)2007-02-082008-08-14Microsoft CorporationUtilizing a first managed process to host at least a second managed process
US7761523B2 (en)2007-02-092010-07-20Research In Motion LimitedSchedulable e-mail filters
US8126506B2 (en)2007-02-142012-02-28Nuance Communications, Inc.System and method for securely managing data stored on mobile devices, such as enterprise mobility data
US20080313648A1 (en)2007-06-142008-12-18Microsoft CorporationProtection and communication abstractions for web browsers
US20080318616A1 (en)2007-06-212008-12-25Verizon Business Network Services, Inc.Flexible lifestyle portable communications device
US20090006232A1 (en)2007-06-292009-01-01Gallagher Ken ASecure computer and internet transaction software and hardware and uses thereof
US20090030968A1 (en)2007-07-272009-01-29Jesse BoudreauRemote control in a wireless communication system
US20090028049A1 (en)2007-07-272009-01-29Jesse BoudreauAdministration of policies for wireless devices in a wireless communication system
US8060074B2 (en)2007-07-302011-11-15Mobile Iron, Inc.Virtual instance architecture for mobile device management systems
US20090077638A1 (en)2007-09-172009-03-19Novell, Inc.Setting and synching preferred credentials in a disparate credential store environment
US8001278B2 (en)2007-09-282011-08-16Intel CorporationNetwork packet payload compression
US20100229197A1 (en)2007-10-312010-09-09Pxd, Inc.Digital broadcast widget system
US20090119773A1 (en)2007-11-022009-05-07D Amore Tianyu LiApparatus and methods of configurable system event and resource arbitration management
US20090228963A1 (en)2007-11-262009-09-10Nortel Networks LimitedContext-based network security
US8601562B2 (en)2007-12-102013-12-03Courion CorporationPolicy enforcement using ESSO
US20090172789A1 (en)2007-12-272009-07-02Hewlett-Packard Development Company, L.P.Policy Based, Delegated Limited Network Access Management
US20090170532A1 (en)2007-12-282009-07-02Apple Inc.Event-based modes for electronic devices
US20090199277A1 (en)2008-01-312009-08-06Norman James MCredential arrangement in single-sign-on environment
US7904468B2 (en)2008-02-272011-03-08Research In Motion LimitedMethod and software for facilitating interaction with a personal information manager application at a wireless communication device
US20090222880A1 (en)2008-03-032009-09-03Tresys Technology, LlcConfigurable access control security for virtualization
US20090228954A1 (en)2008-03-072009-09-10At&T Mobility Ii LlcSystem and method for policy-enabled mobile service gateway
US20130254660A1 (en)2008-03-132013-09-26Robb FujiokaTablet computer
US20090249359A1 (en)2008-03-252009-10-01Caunter Mark LeslieApparatus and methods for widget intercommunication in a wireless communication environment
US8418238B2 (en)2008-03-302013-04-09Symplified, Inc.System, method, and apparatus for managing access to resources across a network
US7966652B2 (en)2008-04-072011-06-21Safemashups Inc.Mashauth: using mashssl for efficient delegated authentication
US20120084184A1 (en)2008-06-052012-04-05Raleigh Gregory GEnterprise Access Control and Accounting Allocation for Access Networks
US20120185913A1 (en)2008-06-192012-07-19Servicemesh, Inc.System and method for a cloud computing abstraction layer with security zone facilities
US20090325615A1 (en)2008-06-292009-12-31Oceans' Edge, Inc.Mobile Telephone Firewall and Compliance Enforcement System and Method
GB2462442A (en)2008-08-062010-02-10Zybert Computing LtdA remote server centrally controls access to data stored in a data container in an encrypted form
US8238256B2 (en)2008-09-082012-08-07Nugent Raymond MSystem and method for cloud computing
US20100077469A1 (en)2008-09-192010-03-25Michael FurmanSingle Sign On Infrastructure
US8528059B1 (en)2008-10-062013-09-03Goldman, Sachs & Co.Apparatuses, methods and systems for a secure resource access and placement platform
US20100100925A1 (en)2008-10-162010-04-22International Business Machines CorporationDigital Rights Management (DRM)-Enabled Policy Management For An Identity Provider In A Federated Environment
US20100100825A1 (en)2008-10-162010-04-22Accenture Global Services GmbhMethod, system and graphical user interface for enabling a user to access enterprise data on a portable electronic device
US20100146523A1 (en)2008-12-052010-06-10Tripod Ventures Inc./ Entreprises Tripod Inc.Browser environment application and local file server application system
US20100154025A1 (en)2008-12-122010-06-17Microsoft CorporationIntegrating policies from a plurality of disparate management agents
US20100150341A1 (en)2008-12-172010-06-17David DodgsonStorage security using cryptographic splitting
US8272030B1 (en)2009-01-212012-09-18Sprint Communications Company L.P.Dynamic security management for mobile communications device
US20130227659A1 (en)2009-01-282013-08-29Headwater Partners I LlcAutomated device provisioning and activation
US20100192212A1 (en)2009-01-282010-07-29Gregory G. RaleighAutomated device provisioning and activation
US20120005724A1 (en)2009-02-092012-01-05Imera Systems, Inc.Method and system for protecting private enterprise resources in a cloud computing environment
US20140059640A9 (en)2009-03-022014-02-27Gregory G. RaleighAdapting Network Policies Based on Device Service Processor Configuration
US20100248699A1 (en)2009-03-312010-09-30Dumais Paul Mark JosephRemote application storage
WO2010115289A1 (en)2009-04-092010-10-14Aegis Mobility, Inc.Context based data mediation
US20100287619A1 (en)2009-05-052010-11-11Absolute Software CorporationDiscriminating data protection system
US20100299376A1 (en)2009-05-202010-11-25Mobile Iron, Inc.Selective Management of Mobile Devices in an Enterprise Environment
US20100299152A1 (en)2009-05-202010-11-25Mobile Iron, Inc.Selective Management of Mobile Devices in an Enterprise Environment
US20100319053A1 (en)2009-06-122010-12-16Apple Inc.Devices with profile-based operating mode controls
US20100317336A1 (en)2009-06-162010-12-16Bran FerrenContext-based limitation of mobile device operation
US20130024424A1 (en)2009-06-302013-01-24Commvault Systems, Inc.Data object store and server for a cloud storage environment, including data deduplication and data management across multiple cloud storage sites
US20130084847A1 (en)2009-07-212013-04-04Scott Ferrill TibbittsMethod and system for controlling a mobile communication device
US20130013653A1 (en)2009-08-052013-01-10International Business Machines CorporationTracking file contents
US20120214472A1 (en)2009-10-312012-08-23Saied TadayonMethod and System for Controlling Mobile Device Functions via a Service or Background Process
US20110145833A1 (en)2009-12-152011-06-16At&T Mobility Ii LlcMultiple Mode Mobile Device
US20110154477A1 (en)2009-12-222011-06-23Cisco Technology, Inc.Dynamic content-based routing
US20110209064A1 (en)2010-02-242011-08-25Novell, Inc.System and method for providing virtual desktop extensions on a client desktop
US8468455B2 (en)2010-02-242013-06-18Novell, Inc.System and method for providing virtual desktop extensions on a client desktop
US20110219124A1 (en)*2010-03-052011-09-08Brass Monkey, Inc.System and method for two way communication and controlling content in a web browser
US20110239125A1 (en)2010-03-242011-09-29Kristensen Kristian HUsing multiple display servers to protect data
US20110252232A1 (en)2010-04-072011-10-13Apple Inc.System and method for wiping encrypted data on a device having file-level content protection
US20110258301A1 (en)2010-04-152011-10-20Research In Motion LimitedMethod and system for transmitting an application to a device
US20110271279A1 (en)2010-04-292011-11-03High Cloud Security, Inc.Secure Virtual Machine
US20130117240A1 (en)2010-05-032013-05-09Panzura, Inc.Accessing cached data from a peer cloud controller in a distributed filesystem
US20110276683A1 (en)2010-05-062011-11-10Trust Digital, LlcDistributed data revocation using data commands
US20110276699A1 (en)2010-05-092011-11-10Pedersen Bradley JSystems and methods for allocation of classes of service to network connections corresponding to virtual channels
US8468090B2 (en)2010-05-212013-06-18Hsbc Technologies Inc.Account opening computer system architecture and process for implementing same
US20110295970A1 (en)2010-05-272011-12-01Canon Kabushiki KaishaCloud computing system, server computer, device connection method, and storage medium
US20120005745A1 (en)2010-06-302012-01-05Juniper Networks, Inc.Vpn network client for mobile device having dynamically translated user home page
US20120005746A1 (en)2010-06-302012-01-05Juniper Networks, Inc.Dual-mode multi-service vpn network client for mobile device
US20120005476A1 (en)2010-06-302012-01-05Juniper Networks, Inc.Multi-service vpn network client for mobile device having integrated acceleration
US20120023506A1 (en)2010-07-202012-01-26Apple Inc.Maintaining Data States Upon Forced Exit
US20120036370A1 (en)2010-07-282012-02-09Nextlabs, Inc.Protecting Documents Using Policies and Encryption
US20120036347A1 (en)2010-08-062012-02-09Swanson Robert CProviding fast non-volatile storage in a secure environment
US20140040656A1 (en)2010-08-262014-02-06Adobe Systems IncorporatedSystem and method for managing cloud deployment configuration of an application
US20120052954A1 (en)2010-08-312012-03-01Sony Computer Entertainment Inc.Offline Progress of Console Game via Portable Device
EP2428894A1 (en)2010-09-142012-03-14AppSense LimitedPrivate application clipboard
US20120066691A1 (en)2010-09-142012-03-15Paul Keith BrantonPrivate application clipboard
US20120088540A1 (en)2010-10-072012-04-12Research In Motion LimitedProvisioning Based on Application and Device Capability
US20120303476A1 (en)2010-11-092012-11-29Openpeak Inc.Communication devices, networks, services and accompanying methods
US20120131116A1 (en)2010-11-152012-05-24Van Quy TuControlling data transfer on mobile devices
US20120131685A1 (en)2010-11-192012-05-24MobileIron, Inc.Mobile Posture-based Policy, Remediation and Access Control for Enterprise Resources
US20130132941A1 (en)2010-11-192013-05-23Mobile Iron, Inc.Management of mobile applications
US20120129503A1 (en)2010-11-192012-05-24MobileIron, Inc.Management of Mobile Applications
US8359016B2 (en)2010-11-192013-01-22Mobile Iron, Inc.Management of mobile applications
US8650620B2 (en)2010-12-202014-02-11At&T Intellectual Property I, L.P.Methods and apparatus to control privileges of mobile device applications
US20120154413A1 (en)2010-12-212012-06-21Dongwoo KimMobile terminal and method of controlling a mode switching therein
US20120159139A1 (en)2010-12-212012-06-21Dongwoo KimMobile terminal and method of controlling a mode switching therein
US20120157165A1 (en)2010-12-212012-06-21Dongwoo KimMobile terminal and method of controlling a mode switching therein
US20120157166A1 (en)2010-12-212012-06-21Dongwoo KimMobile terminal and method of managing information therein
US20120166997A1 (en)2010-12-222012-06-28Hyunah ChoMobile terminal and method of sharing information therein
US20120165075A1 (en)2010-12-222012-06-28Lg Electronics Inc.Mobile terminal and method of displaying information therein
US20120166524A1 (en)2010-12-272012-06-28Takeshi WatakabeInformation Processing Apparatus and Removable Media Management Method
US20120167118A1 (en)2010-12-272012-06-28Microsoft CorporationPower management via coordination and selective operation of timer-related tasks
US20120179909A1 (en)2011-01-062012-07-12Pitney Bowes Inc.Systems and methods for providing individual electronic document secure storage, retrieval and use
US20120179802A1 (en)2011-01-102012-07-12Fiberlink Communications CorporationSystem and method for extending cloud services into the customer premise
US20120185910A1 (en)2011-01-142012-07-19Nokia CorporationMethod and apparatus for adjusting context-based factors for selecting a security policy
US20120198570A1 (en)2011-02-012012-08-02Bank Of America CorporationGeo-Enabled Access Control
US20120204220A1 (en)2011-02-072012-08-09Tufin Software Technologies Ltd.Method of analyzing security ruleset and system thereof
US20130151598A1 (en)2011-02-092013-06-13Cliqr Technologies Inc.Apparatus, systems and methods for deployment of interactive desktop applications on distributed infrastructures
US20120222120A1 (en)2011-02-242012-08-30Samsung Electronics Co. Ltd.Malware detection method and mobile terminal realizing the same
US20130066960A1 (en)2011-02-282013-03-14Siemens Enterprise Communications Gmbh & Co. KgApparatus and Mechanism for Dynamic Assignment of Survivability Services to Mobile Devices
US20120238257A1 (en)2011-03-162012-09-20Anson Douglas MSystem and method for selectively restricting portable information handling system features
US20120240183A1 (en)2011-03-182012-09-20Amit SinhaCloud based mobile device security and policy enforcement
US20120304310A1 (en)2011-03-212012-11-29Mocana CorporationSecure execution of unsecured apps on a device
US20120254768A1 (en)2011-03-312012-10-04Google Inc.Customizing mobile applications
US20130097421A1 (en)2011-04-042013-04-18Nextlabs, Inc.Protecting Information Using Policies and Encryption
US20120272221A1 (en)2011-04-222012-10-25Microsoft CorporationRule based data driven validation
US20120278454A1 (en)2011-04-262012-11-01Stewart Brett BGateway Device Application Development System
US20120303778A1 (en)2011-04-282012-11-29Approxy Inc. Ltd.Application Distribution Network
US20120284325A1 (en)2011-05-022012-11-08Mitel Networks CorporationRegulating use of a mobile computing device for a user at a selected location
US20120284779A1 (en)2011-05-042012-11-08Apple Inc.Electronic devices having adaptive security profiles and methods for selecting the same
US20120311154A1 (en)2011-05-312012-12-06Morgan Christopher EdwinSystems and methods for triggering workload movement based on policy stack having multiple selectable inputs
US20120311659A1 (en)2011-06-012012-12-06Mobileasap, Inc.Real-time mobile application management
US8578443B2 (en)2011-06-012013-11-05Mobileasap, Inc.Real-time mobile application management
US20120324568A1 (en)2011-06-142012-12-20Lookout, Inc., A California CorporationMobile web protection
US20120331527A1 (en)2011-06-222012-12-27TerraWi, Inc.Multi-layer, geolocation-based network resource access and permissions
US20120331528A1 (en)2011-06-272012-12-27Osmosix, Inc.Apparatus, systems and methods for secure and selective access to services in hybrid public-private infrastructures
US20130002725A1 (en)2011-06-282013-01-03Dongwoo KimMobile terminal and display controlling method therein
US20130007842A1 (en)2011-06-282013-01-03Hyekyung ParkMobile terminal and display controlling method therein
US20130013688A1 (en)2011-07-072013-01-10Cisco Technology, Inc.System and method for providing a message and an event based video services control plane
US20130014239A1 (en)2011-07-082013-01-10International Business Machines CorporationAuthenticating a rich client from within an existing browser session
US20130024928A1 (en)2011-07-222013-01-24Robert James BurkeSecure network communications for meters
US20130145448A1 (en)2011-08-052013-06-06Vmware, Inc.Lock screens to access work environments on a personal mobile device
US20130042294A1 (en)2011-08-082013-02-14Microsoft CorporationIdentifying application reputation based on resource accesses
US20130054922A1 (en)2011-08-232013-02-28Vmware, Inc.Cooperative memory resource management for virtualized computing devices
US20130055378A1 (en)2011-08-292013-02-28Pantech Co., Ltd.Method and portable device for controlling permission settings for application
US20130054962A1 (en)2011-08-312013-02-28Deepak ChawlaPolicy configuration for mobile device applications
US20130059284A1 (en)2011-09-072013-03-07Teegee, LlcInteractive electronic toy and learning device system
US20130138810A1 (en)2011-09-092013-05-30Shuki BinyaminSystems and Methods for Workspace Interaction with Cloud-Based Applications
US20130074142A1 (en)2011-09-152013-03-21Microsoft CorporationSecuring data usage in computing devices
US20130086684A1 (en)2011-09-302013-04-04David S. MohlerContextual virtual machines for application quarantine and assessment method and system
US8402011B1 (en)2011-10-102013-03-19Google Inc.System and method for managing user web browsing information
US20130091543A1 (en)2011-10-102013-04-11Openpeak Inc.System and method for creating secure applications
US20140032691A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US20140040977A1 (en)2011-10-112014-02-06Citrix Systems, Inc.Policy-Based Application Management
US20140033271A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US20140032733A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US20140032758A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US20140040638A1 (en)2011-10-112014-02-06Citrix Systems, Inc.Policy-Based Application Management
US20140032759A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US20140006347A1 (en)2011-10-112014-01-02Zenprise, Inc.Secure container for protecting enterprise data on a mobile device
US20140040979A1 (en)2011-10-112014-02-06Citrix Systems, Inc.Policy-Based Application Management
US20140007183A1 (en)2011-10-112014-01-02Zenprise, Inc.Controlling mobile device access to enterprise resources
US20140040978A1 (en)2011-10-112014-02-06Citrix Systems, Inc.Policy-Based Application Management
US8239918B1 (en)2011-10-112012-08-07Google Inc.Application marketplace administrative controls
US20130111540A1 (en)2011-10-282013-05-02Jason Allen SabinCloud protection techniques
US20130117805A1 (en)2011-11-092013-05-09Microsoft CorporationTechniques to apply and share remote policies on mobile devices
US20130132457A1 (en)2011-11-182013-05-23Computer Associates Think, Inc.System and method for hand-offs in cloud environments
US20130130651A1 (en)2011-11-222013-05-23Vmware, Inc.Provisioning work environments on personal mobile devices
US20130130652A1 (en)2011-11-222013-05-23Vmware, Inc.Controlling use of a business environment on a mobile device
US20130133061A1 (en)2011-11-222013-05-23Vmware, Inc.Method and system for vpn isolation using network namespaces
US20130139241A1 (en)2011-11-292013-05-30Michael LeederMethods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains
US20130138766A1 (en)2011-11-292013-05-30Dell Products L.P.Mode sensitive networking
US20130142043A1 (en)2011-12-062013-06-06T-Mobile Usa, Inc.Quality of service application controller and user equipment application profiler
US20130171967A1 (en)2012-01-042013-07-04Ayman S. AshourProviding Secure Execution of Mobile Device Workflows
US20130297662A1 (en)2012-01-062013-11-07Rahul SharmaSecure Virtual File Management System
US20130219176A1 (en)2012-01-062013-08-22Venkata Sastry AkellaSecure Virtual File Management System
US20130219456A1 (en)2012-01-062013-08-22Rahul SharmaSecure Virtual File Management System
US20130219211A1 (en)2012-02-172013-08-22International Business Machines CorporationElastic Cloud-Driven Task Execution
US20130232541A1 (en)2012-03-022013-09-05International Business Machines CorporationPolicy-driven approach to managing privileged/shared identity in an enterprise
US20130254831A1 (en)2012-03-232013-09-26Lockheed Martin CorporationMethod and apparatus for context aware mobile security
US20130254262A1 (en)2012-03-262013-09-26Quickmobile Inc.System and method for a user to dynamically update a mobile application from a generic or first application within a class of applications to create a specific or second application with said class of applications
US20130263209A1 (en)2012-03-302013-10-03Cognizant Business Services LimitedApparatus and methods for managing applications in multi-cloud environments
US20130263208A1 (en)2012-04-022013-10-03Narsimha Reddy ChallaManaging virtual machines in a cloud computing system
US20130291052A1 (en)2012-04-302013-10-31Ca, Inc.Trusted public infrastructure grid cloud
US20130298242A1 (en)2012-05-012013-11-07Taasera, Inc.Systems and methods for providing mobile security based on dynamic attestation
US20130297604A1 (en)2012-05-012013-11-07Research In Motion LimitedElectronic device and method for classification of communication data objects
US20130298185A1 (en)2012-05-022013-11-07Kony Solutions, Inc.Mobile application management systems and methods thereof
US20130298201A1 (en)2012-05-052013-11-07Citrix Systems, Inc.Systems and methods for network filtering in vpn
US20130303194A1 (en)2012-05-112013-11-14Iolo Technologies, LlcAutomatic determination of and reaction to mobile user routine behavior based on geographical and repetitive pattern analysis
US20130311597A1 (en)2012-05-162013-11-21Apple Inc.Locally backed cloud-based storage
US20130318345A1 (en)2012-05-222013-11-28Harris CorporationMulti-tunnel virtual private network
US20130333005A1 (en)2012-06-072013-12-12Sk Planet Co., Ltd.Cloud service system based on enhanced security function and method for supporting the same
US20130346268A1 (en)2012-06-212013-12-26Google Inc.Mobile Application Management
US20140020062A1 (en)2012-07-112014-01-16Chandra Shekhar Rao TumulaTechniques for protecting mobile applications
US20140020073A1 (en)2012-07-132014-01-16Troy Jacob RondaMethods and systems for using derived credentials to authenticate a device across multiple platforms
US20140059642A1 (en)2012-08-242014-02-27Vmware, Inc.Method and system for facilitating isolated workspace for applications
US8613070B1 (en)2012-10-122013-12-17Citrix Systems, Inc.Single sign-on access in an orchestration framework for connected devices

Non-Patent Citations (19)

* Cited by examiner, † Cited by third party
Title
"Citrix XenMobile Technology Overview: White Paper," Citrix White Papers online, Jul. 31, 2012, pp. 1-14; retrieved from http://insight.com/content/aam/insight/en-US/pdfs/citrix/xenmobile-tech-overview.pdf, retrieved Jan. 27, 2014.
Apple Inc., iPad User Guide for iOS 6.1 Software, Jan. 2013, Chapter 26, Accessibility, pp. 107-108.
International Search Report and Written Opinion dated Feb. 4, 2014 in Application No. PCT/US2013/064349.
International Search Report and Written Opinion mailed Jan. 21, 2014 in International Application No. PCT/US2013/063856.
International Search Report and Written Opinion mailed Nov. 26, 2013 in Internation Application No. PCT/US2013/060388.
Lowe, "Application-Specific VPNs," Dec. 13, 2005.
Mysore et al., "The Liquid Media System-a Multi-Device Streaming Media Orchestration Framework", Ubicomp 2003 Workshop, pp. 1-4.
Na et al., "Personal Cloud Computing Security Framework," 2010 IEEE Asia-Pacific Computing Conference, 2010, pp. 671-675.
Non-Final Office Action dated Dec. 20, 2013, in U.S. Appl. No. 14/043,301.
Non-Final Office Action dated Dec. 27, 2013, in U.S. Appl. No. 14/042,941.
Non-Final Office Action dated Dec. 27, 2013, in U.S. Appl. No. 14/043,012.
Non-Final Office Action dated Dec. 30, 2013, in U.S. Appl. No. 14/043,164.
Non-Final Office Action dated Dec. 31, 2013, in U.S. Appl. No. 14/042,984.
Non-Final Office Action dated Jan. 6, 2014, in U.S. Appl. No. 14/043,229.
Ranjan et al., "Programming Cloud Resource Orchestration Framework: Operations and Research Challenges", arvix.org, 2012, pp. 1-19.
Wilson et al., "Unified Security Framework", In proceedings of the 1st International Symposium on Information and Communication Technologies, pp. 500-505. Trinity College Dublin, 2003.
Written Opinion and International Search Report, PCT/US2013/062636, Jan. 10, 2014.
Xuetao Wei, et al., "Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?,". ICDE Workshop on Secure Data Management on Smartphones and Mobiles, Apr. 2012, 4 pages.
Xuetao Wei, et al., "Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?,"• ICDE Workshop on Secure Data Management on Smartphones and Mobiles, Apr. 2012, 4 pages.

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9355228B2 (en)2012-07-132016-05-31Angel Secure Networks, Inc.System and method for policy driven protection of remote computing environments
US10713087B2 (en)*2014-01-102020-07-14Citrix Systems, Inc.Management of unmanaged user accounts and tasks in a multi-account mobile application
US20210211507A1 (en)*2018-09-242021-07-08Salesforce.Com, Inc.Multi-channel session connection management mechanism
US12041041B2 (en)*2019-08-212024-07-16Truist BankLocation-based mobile device authentication
US20210081362A1 (en)*2019-09-132021-03-18Citrix Systems, Inc.Multi-web application collaboration techniques
US11669497B2 (en)*2019-09-132023-06-06Citrix Systems, Inc.Multi-web application collaboration techniques
US20210136059A1 (en)*2019-11-052021-05-06Salesforce.Com, Inc.Monitoring resource utilization of an online system based on browser attributes collected for a session
US12047373B2 (en)*2019-11-052024-07-23Salesforce.Com, Inc.Monitoring resource utilization of an online system based on browser attributes collected for a session
US12289308B2 (en)*2020-11-132025-04-29Cyberark Software Ltd.Native remote access to target resources using secretless connections
US20220294788A1 (en)*2021-03-092022-09-15Oracle International CorporationCustomizing authentication and handling pre and post authentication in identity cloud service
US12238101B2 (en)*2021-03-092025-02-25Oracle International CorporationCustomizing authentication and handling pre and post authentication in identity cloud service
US20230237171A1 (en)*2022-01-212023-07-27Vmware, Inc.Securing web browsing on a managed user device

Also Published As

Publication numberPublication date
JP6397957B2 (en)2018-09-26
US8850010B1 (en)2014-09-30
US20160241599A1 (en)2016-08-18
US8898732B2 (en)2014-11-25
US8893221B2 (en)2014-11-18
US9355223B2 (en)2016-05-31
KR20170045372A (en)2017-04-26
KR101728899B1 (en)2017-04-20
US20140298405A1 (en)2014-10-02
US8996709B2 (en)2015-03-31
US8881228B2 (en)2014-11-04
US20140297861A1 (en)2014-10-02
US9158895B2 (en)2015-10-13
US20140297860A1 (en)2014-10-02
CN105247531A (en)2016-01-13
US20140298404A1 (en)2014-10-02
JP2016519817A (en)2016-07-07
CN105247531B (en)2018-03-20
US20140297862A1 (en)2014-10-02
EP3413227A1 (en)2018-12-12
JP2017168111A (en)2017-09-21
US20140297819A1 (en)2014-10-02
US20140298348A1 (en)2014-10-02
US20140297756A1 (en)2014-10-02
US20140298442A1 (en)2014-10-02
EP2979218A1 (en)2016-02-03
US10097584B2 (en)2018-10-09
KR102038842B1 (en)2019-10-31
KR20160018476A (en)2016-02-17
WO2014158228A1 (en)2014-10-02
JP6131381B2 (en)2017-05-17
US9112853B2 (en)2015-08-18

Similar Documents

PublicationPublication DateTitle
US10097584B2 (en)Providing a managed browser
EP3531662B1 (en)Providing mobile device management functionalities
US8910264B2 (en)Providing mobile device management functionalities
US9985850B2 (en)Providing mobile device management functionalities
US8849978B1 (en)Providing an enterprise application store
US8813179B1 (en)Providing mobile device management functionalities

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:CITRIX SYSTEMS, INC., FLORIDA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:QURESHI, WAHEED;REEL/FRAME:031451/0153

Effective date:20130929

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551)

Year of fee payment:4

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8

ASAssignment

Owner name:WILMINGTON TRUST, NATIONAL ASSOCIATION, DELAWARE

Free format text:SECURITY INTEREST;ASSIGNOR:CITRIX SYSTEMS, INC.;REEL/FRAME:062079/0001

Effective date:20220930

ASAssignment

Owner name:GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW YORK

Free format text:SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNORS:TIBCO SOFTWARE INC.;CITRIX SYSTEMS, INC.;REEL/FRAME:062113/0001

Effective date:20220930

Owner name:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT, DELAWARE

Free format text:PATENT SECURITY AGREEMENT;ASSIGNORS:TIBCO SOFTWARE INC.;CITRIX SYSTEMS, INC.;REEL/FRAME:062113/0470

Effective date:20220930

Owner name:BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA

Free format text:PATENT SECURITY AGREEMENT;ASSIGNORS:TIBCO SOFTWARE INC.;CITRIX SYSTEMS, INC.;REEL/FRAME:062112/0262

Effective date:20220930

ASAssignment

Owner name:CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.), FLORIDA

Free format text:RELEASE AND REASSIGNMENT OF SECURITY INTEREST IN PATENT (REEL/FRAME 062113/0001);ASSIGNOR:GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT;REEL/FRAME:063339/0525

Effective date:20230410

Owner name:CITRIX SYSTEMS, INC., FLORIDA

Free format text:RELEASE AND REASSIGNMENT OF SECURITY INTEREST IN PATENT (REEL/FRAME 062113/0001);ASSIGNOR:GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT;REEL/FRAME:063339/0525

Effective date:20230410

Owner name:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT, DELAWARE

Free format text:PATENT SECURITY AGREEMENT;ASSIGNORS:CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.);CITRIX SYSTEMS, INC.;REEL/FRAME:063340/0164

Effective date:20230410

ASAssignment

Owner name:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT, DELAWARE

Free format text:SECURITY INTEREST;ASSIGNORS:CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.);CITRIX SYSTEMS, INC.;REEL/FRAME:067662/0568

Effective date:20240522


[8]ページ先頭

©2009-2025 Movatter.jp